From 1e14d1b12f3fc9a9ae43726606e811aab90a0110 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 23 Jun 2025 16:04:07 +0000 Subject: [PATCH] Auto-Update: 2025-06-23T16:00:28.688260+00:00 --- CVE-2019/CVE-2019-24xx/CVE-2019-2483.json | 78 ++++++- CVE-2023/CVE-2023-472xx/CVE-2023-47297.json | 25 ++ CVE-2023/CVE-2023-472xx/CVE-2023-47298.json | 25 ++ CVE-2023/CVE-2023-489xx/CVE-2023-48978.json | 25 ++ CVE-2024/CVE-2024-212xx/CVE-2024-21206.json | 28 ++- CVE-2024/CVE-2024-226xx/CVE-2024-22654.json | 38 ++- CVE-2024/CVE-2024-42xx/CVE-2024-4256.json | 77 ++++++- CVE-2024/CVE-2024-487xx/CVE-2024-48766.json | 52 ++++- CVE-2024/CVE-2024-51xx/CVE-2024-5154.json | 10 +- CVE-2024/CVE-2024-51xx/CVE-2024-5193.json | 67 +++++- CVE-2024/CVE-2024-547xx/CVE-2024-54779.json | 45 +++- CVE-2024/CVE-2024-572xx/CVE-2024-57273.json | 49 +++- CVE-2024/CVE-2024-85xx/CVE-2024-8523.json | 66 +++++- CVE-2025/CVE-2025-13xx/CVE-2025-1378.json | 63 ++++- CVE-2025/CVE-2025-19xx/CVE-2025-1925.json | 74 +++++- CVE-2025/CVE-2025-201xx/CVE-2025-20188.json | 62 ++++- CVE-2025/CVE-2025-214xx/CVE-2025-21489.json | 28 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21506.json | 28 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21516.json | 28 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21533.json | 35 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21535.json | 31 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21541.json | 28 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21547.json | 41 +++- CVE-2025/CVE-2025-215xx/CVE-2025-21549.json | 26 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21550.json | 36 ++- CVE-2025/CVE-2025-21xx/CVE-2025-2171.json | 82 +++++++ CVE-2025/CVE-2025-21xx/CVE-2025-2172.json | 82 +++++++ CVE-2025/CVE-2025-23xx/CVE-2025-2357.json | 51 ++++- CVE-2025/CVE-2025-25xx/CVE-2025-2558.json | 46 +++- CVE-2025/CVE-2025-275xx/CVE-2025-27531.json | 35 ++- CVE-2025/CVE-2025-283xx/CVE-2025-28386.json | 45 +++- CVE-2025/CVE-2025-328xx/CVE-2025-32875.json | 24 +- CVE-2025/CVE-2025-40xx/CVE-2025-4043.json | 45 +++- CVE-2025/CVE-2025-41xx/CVE-2025-4135.json | 62 ++++- CVE-2025/CVE-2025-41xx/CVE-2025-4139.json | 61 ++++- CVE-2025/CVE-2025-450xx/CVE-2025-45001.json | 40 +++- CVE-2025/CVE-2025-450xx/CVE-2025-45002.json | 34 ++- CVE-2025/CVE-2025-458xx/CVE-2025-45855.json | 37 ++- CVE-2025/CVE-2025-460xx/CVE-2025-46096.json | 33 ++- CVE-2025/CVE-2025-461xx/CVE-2025-46101.json | 21 ++ CVE-2025/CVE-2025-467xx/CVE-2025-46721.json | 75 +++++- CVE-2025/CVE-2025-47xx/CVE-2025-4727.json | 70 +++++- CVE-2025/CVE-2025-47xx/CVE-2025-4792.json | 66 +++++- CVE-2025/CVE-2025-487xx/CVE-2025-48700.json | 29 +++ CVE-2025/CVE-2025-487xx/CVE-2025-48705.json | 43 +++- CVE-2025/CVE-2025-487xx/CVE-2025-48748.json | 27 ++- CVE-2025/CVE-2025-490xx/CVE-2025-49080.json | 50 +++- CVE-2025/CVE-2025-50xx/CVE-2025-5049.json | 66 +++++- CVE-2025/CVE-2025-50xx/CVE-2025-5050.json | 66 +++++- CVE-2025/CVE-2025-50xx/CVE-2025-5051.json | 66 +++++- CVE-2025/CVE-2025-50xx/CVE-2025-5052.json | 66 +++++- CVE-2025/CVE-2025-50xx/CVE-2025-5075.json | 66 +++++- CVE-2025/CVE-2025-50xx/CVE-2025-5076.json | 66 +++++- CVE-2025/CVE-2025-51xx/CVE-2025-5110.json | 66 +++++- CVE-2025/CVE-2025-51xx/CVE-2025-5111.json | 66 +++++- CVE-2025/CVE-2025-525xx/CVE-2025-52542.json | 16 ++ CVE-2025/CVE-2025-528xx/CVE-2025-52875.json | 56 +++++ CVE-2025/CVE-2025-528xx/CVE-2025-52876.json | 56 +++++ CVE-2025/CVE-2025-528xx/CVE-2025-52877.json | 56 +++++ CVE-2025/CVE-2025-528xx/CVE-2025-52878.json | 56 +++++ CVE-2025/CVE-2025-528xx/CVE-2025-52879.json | 56 +++++ CVE-2025/CVE-2025-529xx/CVE-2025-52937.json | 14 +- CVE-2025/CVE-2025-529xx/CVE-2025-52967.json | 64 ++++++ CVE-2025/CVE-2025-529xx/CVE-2025-52968.json | 67 ++++++ CVE-2025/CVE-2025-53xx/CVE-2025-5330.json | 81 ++++++- CVE-2025/CVE-2025-53xx/CVE-2025-5331.json | 79 ++++++- CVE-2025/CVE-2025-56xx/CVE-2025-5641.json | 62 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5642.json | 62 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5643.json | 62 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5644.json | 62 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5645.json | 62 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5646.json | 62 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5647.json | 62 ++++- CVE-2025/CVE-2025-58xx/CVE-2025-5875.json | 78 ++++++- CVE-2025/CVE-2025-60xx/CVE-2025-6019.json | 54 ++++- CVE-2025/CVE-2025-63xx/CVE-2025-6368.json | 14 +- CVE-2025/CVE-2025-63xx/CVE-2025-6369.json | 14 +- CVE-2025/CVE-2025-63xx/CVE-2025-6370.json | 14 +- CVE-2025/CVE-2025-63xx/CVE-2025-6371.json | 14 +- CVE-2025/CVE-2025-63xx/CVE-2025-6375.json | 14 +- CVE-2025/CVE-2025-63xx/CVE-2025-6393.json | 14 +- CVE-2025/CVE-2025-63xx/CVE-2025-6394.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6403.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6404.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6405.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6406.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6407.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6408.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6413.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6414.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6415.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6416.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6417.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6418.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6419.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6420.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6421.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6452.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6453.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6455.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6456.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6457.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6458.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6466.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6467.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6477.json | 14 +- CVE-2025/CVE-2025-64xx/CVE-2025-6498.json | 10 +- CVE-2025/CVE-2025-64xx/CVE-2025-6499.json | 10 +- CVE-2025/CVE-2025-65xx/CVE-2025-6500.json | 10 +- CVE-2025/CVE-2025-65xx/CVE-2025-6501.json | 10 +- README.md | 68 ++++-- _state.csv | 241 +++++++++++--------- 112 files changed, 4014 insertions(+), 587 deletions(-) create mode 100644 CVE-2023/CVE-2023-472xx/CVE-2023-47297.json create mode 100644 CVE-2023/CVE-2023-472xx/CVE-2023-47298.json create mode 100644 CVE-2023/CVE-2023-489xx/CVE-2023-48978.json create mode 100644 CVE-2025/CVE-2025-21xx/CVE-2025-2171.json create mode 100644 CVE-2025/CVE-2025-21xx/CVE-2025-2172.json create mode 100644 CVE-2025/CVE-2025-461xx/CVE-2025-46101.json create mode 100644 CVE-2025/CVE-2025-487xx/CVE-2025-48700.json create mode 100644 CVE-2025/CVE-2025-525xx/CVE-2025-52542.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52875.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52876.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52877.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52878.json create mode 100644 CVE-2025/CVE-2025-528xx/CVE-2025-52879.json create mode 100644 CVE-2025/CVE-2025-529xx/CVE-2025-52967.json create mode 100644 CVE-2025/CVE-2025-529xx/CVE-2025-52968.json diff --git a/CVE-2019/CVE-2019-24xx/CVE-2019-2483.json b/CVE-2019/CVE-2019-24xx/CVE-2019-2483.json index ceb10d7ddde..23e64248836 100644 --- a/CVE-2019/CVE-2019-24xx/CVE-2019-2483.json +++ b/CVE-2019/CVE-2019-24xx/CVE-2019-2483.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2483", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-12-24T19:15:05.757", - "lastModified": "2024-12-24T19:15:05.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:21:09.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7F97E907-8C38-44D8-8787-E7BD95B3ACE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F9FC7EAC-DC83-466B-BEC7-459E82DF014D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "3B70A22F-D67A-4BF6-AF17-686BF3A9BCB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8355653B-79DD-4DCB-83CA-066BE4D8D9D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "0A91551D-F3E4-4852-A333-733A28F49CF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "5E501CF6-0457-4160-9FD9-14B903219DBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "9E835828-6E56-472F-B497-DB5D90FF49F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "0050E830-3AB1-4D5B-BEB4-A46EC6418599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:istore:12.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "9E10272A-5407-48E2-93FC-A84A65F7EE38" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2019-5072801.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47297.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47297.json new file mode 100644 index 00000000000..e0ba8c57000 --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47297.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-47297", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T15:15:25.940", + "lastModified": "2025-06-23T15:15:25.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A settings manipulation vulnerability in NCR Terminal Handler v1.5.1 allows attackers to execute arbitrary commands, including editing system security auditing configurations." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1YzoJ2QuI9LEEpF8r5ZiCdTQtR9hfsXl7/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47297/CVE-2023-47297.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47298.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47298.json new file mode 100644 index 00000000000..68d7ab5bc75 --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47298.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-47298", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T15:15:26.700", + "lastModified": "2025-06-23T15:15:26.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in NCR Terminal Handler 1.5.1 allows a low-level privileged authenticated attacker to query the SOAP API endpoint to obtain information about all of the users of the application including their usernames, roles, security groups and account statuses." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1-BDd0ycuYhuxo-lg4th-Cswimoqqzkot/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47298/CVE-2023-47298.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48978.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48978.json new file mode 100644 index 00000000000..3be04592858 --- /dev/null +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48978.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-48978", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T15:15:26.890", + "lastModified": "2025-06-23T15:15:26.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in NCR ITM Web terminal v.4.4.0 and v.4.4.4 allows a remote attacker to execute arbitrary code via a crafted script to the IP camera URL component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/13JrkDcVtcQFepeGoG8roBZ1xFy7iBx1R/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-48978/CVE-2023-48978.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21206.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21206.json index 30fdf2a9e76..aae7ed0a413 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21206.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21206", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:09.050", - "lastModified": "2024-10-31T13:35:04.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:20:13.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:enterprise_command_center_framework:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11", + "versionEndIncluding": "13", + "matchCriteriaId": "B88C407A-0A59-46DD-9093-8714208F9B92" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22654.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22654.json index 807fa2d8110..8fa4882852d 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22654.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22654", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-29T15:15:29.693", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:42:44.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "92890213-A6DC-469D-869E-B65DC1634190" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/TimChan2001/4f25915b9952e8e3453db5cf72185b88", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/appneta/tcpreplay/issues/827", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/appneta/tcpreplay/issues/827", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4256.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4256.json index f5118360f12..1cce97e85c2 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4256.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4256.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4256", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T16:15:07.170", - "lastModified": "2024-11-21T09:42:29.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:07:20.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:techkshetrainfo:savsoft_quiz:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5E5B5D6E-C991-499C-9F2C-E1937DF621E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.262148", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262148", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319897", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?ctiid.262148", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262148", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319897", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48766.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48766.json index 27e572e3d12..570cdd911f1 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48766.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48766.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48766", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-13T16:15:23.717", - "lastModified": "2025-05-13T20:15:25.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:59:36.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,20 +49,62 @@ "value": "CWE-698" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netalertxnetalertx:*:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.7.18", + "versionEndExcluding": "24.10.12", + "matchCriteriaId": "D2D19236-3E00-4144-B81D-56268DEC39C6" + } + ] + } + ] } ], "references": [ { "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/netalertx_file_read.rb", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Mitigation" + ] }, { "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5154.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5154.json index c6131393bb8..f93738382d6 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5154.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5154.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5154", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-12T09:15:19.973", - "lastModified": "2024-12-11T04:15:04.990", + "lastModified": "2025-06-23T14:15:26.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -171,6 +171,10 @@ "Vendor Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4159", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:4486", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5193.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5193.json index 62c057b76a8..a40ad2b10a7 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5193.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5193", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-22T11:15:53.487", - "lastModified": "2024-11-21T09:47:09.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:07:25.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -120,38 +120,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ritlabs:tinyweb:1.94:*:*:*:*:*:*:*", + "matchCriteriaId": "45D37E23-FA98-4094-B4FB-495C102613DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DMCERTCE/CRLF_Tiny", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333059", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/DMCERTCE/CRLF_Tiny", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.265830", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.265830", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.333059", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54779.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54779.json index 9df16a535e3..db56931d1a2 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54779.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54779", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-14T14:15:25.927", - "lastModified": "2025-05-19T15:15:22.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:38.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgate:pfsense_ce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.8.0", + "matchCriteriaId": "D29B384D-CD2B-4B32-9356-5F2503EB3849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*", + "versionEndExcluding": "25.03", + "matchCriteriaId": "25B25352-DA4B-47FC-905F-4146E989570D" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.brillantit.com/exploiting-pfsense-xss-command-injection-cloud-hijack/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://docs.netgate.com/downloads/pfSense-SA-25_01.webgui.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "Mailing List" + ] }, { "url": "https://www.netgate.com/blog/important-security-updates-for-pfsense-plus-24.11-and-ce-2.7.2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57273.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57273.json index b5f30929847..8e5099b6ede 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57273.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57273.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57273", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-14T14:15:26.310", - "lastModified": "2025-05-19T16:15:26.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:50:34.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgate:pfsense_ce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.8.0", + "matchCriteriaId": "D29B384D-CD2B-4B32-9356-5F2503EB3849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgate:pfsense_plus:*:*:*:*:*:*:*:*", + "versionEndExcluding": "25.03", + "matchCriteriaId": "25B25352-DA4B-47FC-905F-4146E989570D" + } + ] + } + ] + } + ], "references": [ { "url": "http://netgate.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://blog.brillantit.com/exploiting-pfsense-xss-command-injection-cloud-hijack/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://docs.netgate.com/downloads/pfSense-SA-25_03.webgui.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.netgate.com/blog/important-security-updates-for-pfsense-plus-24.11-and-ce-2.7.2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8523.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8523.json index a5f49f2099a..31418b5863b 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8523.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8523.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8523", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T09:15:02.807", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:07:51.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lmxcms:lmxcms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.4", + "matchCriteriaId": "83E38167-F858-4A63-8C63-79336B9DFA09" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/lmx.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276728", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.276728", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.399916", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1378.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1378.json index a8d41167b1b..4e2401be2b1 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1378.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1378.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1378", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-17T06:15:13.277", - "lastModified": "2025-02-17T06:15:13.277", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:37:28.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -120,34 +120,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE116081-11B9-4F5B-B0A1-62B6FAEAC449" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/radareorg/radare2/commit/c6c772d2eab692ce7ada5a4227afd50c355ad545", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/radareorg/radare2/issues/23953", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/23953#issue-2844325926", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/milestone/86", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.295986", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295986", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.498499", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json index ba2c9a64b89..2687e51586e 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1925.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1925", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T14:15:36.717", - "lastModified": "2025-03-04T14:15:36.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:10:37.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -120,26 +140,64 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.7.2", + "matchCriteriaId": "E8160C0A-E77F-487D-B5E0-C6657E80D327" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/guoweifk/BugReport/blob/main/Open5GS%20AMF%20Denial%20of%20Service%20via%20PDU%20Session%20ID%20Conflict", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/open5gs/open5gs/pull/3711", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298513", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298513", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.506038", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20188.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20188.json index e79724fd2cd..5ff8fdb1ece 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20188.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20188.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20188", "sourceIdentifier": "psirt@cisco.com", "published": "2025-05-07T18:15:38.617", - "lastModified": "2025-06-06T17:15:30.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:15:11.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*", + "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*", + "matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://horizon3.ai/attack-research/attack-blogs/cisco-ios-xe-wlc-arbitrary-file-upload-vulnerability-cve-2025-20188-analysis/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21489.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21489.json index 773716357e1..fdd0f961835 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21489.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21489.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21489", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:13.577", - "lastModified": "2025-01-23T20:15:31.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:21:28.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.10", + "matchCriteriaId": "0D76EBA1-1507-4365-9F9F-96537DA68119" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21506.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21506.json index 63039f41431..c34155aaefe 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21506.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21506.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21506", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:15.707", - "lastModified": "2025-01-22T19:15:10.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:21:39.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21516.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21516.json index 7b23b56ffd0..919b34ba9b9 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21516.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21516.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21516", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:17.030", - "lastModified": "2025-01-22T19:15:10.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:22:04.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.13", + "matchCriteriaId": "03EF06AB-699E-4F8E-8B6C-C4B17F3F4DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21533.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21533.json index a2948cdfbd6..669cf1b482c 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21533.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21533.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21533", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:19.240", - "lastModified": "2025-01-22T19:15:11.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:22:21.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.24", + "matchCriteriaId": "9D32CFD8-0D55-4466-A7F4-B5FF471AE6CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.0", + "versionEndExcluding": "7.1.6", + "matchCriteriaId": "38DEB6E3-61A7-4998-B593-0C574B03E792" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21535.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21535.json index e14d53bad6c..802820dfa16 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21535.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21535.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21535", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:19.477", - "lastModified": "2025-01-22T19:15:12.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:22:32.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21541.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21541.json index 77f8111bf9a..9bdca95a2b4 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21541.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21541.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21541", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:20.287", - "lastModified": "2025-01-22T19:15:12.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:23:31.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:workflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.14", + "matchCriteriaId": "B8EDFF6B-489B-48D0-8B48-B3E8F9FBCD7C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json index a49aaaaaf67..8fba2073cc3 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21547", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.110", - "lastModified": "2025-03-18T19:15:47.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:24:44.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6.19.20:*:*:*:*:*:*:*", + "matchCriteriaId": "F1C43706-08BB-497C-BACD-29F02114C9A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6.25.8:*:*:*:*:*:*:*", + "matchCriteriaId": "462CD9C3-D903-4433-8537-E930BEAEE371" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6.26.6:*:*:*:*:*:*:*", + "matchCriteriaId": "7C5550B1-E8E4-4898-A629-FCAADC8865F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6.27.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8F9D7B16-41B5-46DF-B889-861EF34B4B37" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21549.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21549.json index 6f351662b1c..6c122df9a97 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21549.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21549.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21549", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.377", - "lastModified": "2025-03-13T19:15:51.240", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:24:53.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json index 3fe29fbd57e..6dfa9dcc8b6 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21550.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21550", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.510", - "lastModified": "2025-03-13T15:15:51.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:25:05.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3BBB9F8E-7374-4426-A269-FB669644538F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "C28D8453-2E02-43C3-8998-8B694F4B7505" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "49BE74EB-7D30-47FF-B1BD-21A57CD091B1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2171.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2171.json new file mode 100644 index 00000000000..cb58d3c5a14 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2171.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-2171", + "sourceIdentifier": "mandiant-cve@google.com", + "published": "2025-06-23T14:15:26.437", + "lastModified": "2025-06-23T14:15:26.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Aviatrix Controller versions prior to 7.1.4208, 7.2.5090, and 8.0.0 do not enforce rate limiting on password reset attempts, allowing adversaries to brute force guess the 6-digit password reset PIN" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "mandiant-cve@google.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "mandiant-cve@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://cloud.google.com/blog/topics/threat-intelligence/remote-code-execution-aviatrix-controller", + "source": "mandiant-cve@google.com" + }, + { + "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0003.md", + "source": "mandiant-cve@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2172.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2172.json new file mode 100644 index 00000000000..1d0403e00dc --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2172.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-2172", + "sourceIdentifier": "mandiant-cve@google.com", + "published": "2025-06-23T14:15:26.607", + "lastModified": "2025-06-23T14:15:26.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Aviatrix Controller versions prior to 7.1.4208, 7.2.5090, and 8.0.0 fail to sanitize user input prior to passing the input to command line utilities, allowing command injection via special characters in filenames" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "mandiant-cve@google.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "mandiant-cve@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://cloud.google.com/blog/topics/threat-intelligence/remote-code-execution-aviatrix-controller", + "source": "mandiant-cve@google.com" + }, + { + "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0004.md", + "source": "mandiant-cve@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2357.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2357.json index 18f51075898..fe0f3243bd9 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2357.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2357.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2357", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-17T02:15:13.583", - "lastModified": "2025-03-17T02:15:13.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:11:50.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -120,26 +120,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:offis:dcmtk:3.6.9:*:*:*:*:*:*:*", + "matchCriteriaId": "16BC1718-C1CE-4CCF-AF01-4C922B664B2F" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.dcmtk.org/redmine/issues/1155", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://support.dcmtk.org/redmine/issues/1155?tab=history#note-1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.299824", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.299824", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.513692", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2558.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2558.json index de140cf8c95..cf28305366f 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2558.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2558.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2558", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-24T06:15:45.800", - "lastModified": "2025-04-29T13:52:47.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:17:34.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:the_wound_project:the_wound:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.0.1", + "matchCriteriaId": "1B939288-6C53-42EE-B321-4981EC090C42" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/6a8e1c89-a01d-4347-91fc-ba454784b153/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/6a8e1c89-a01d-4347-91fc-ba454784b153/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json index fa74ba09b3d..a54e2c3f981 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27531.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27531", "sourceIdentifier": "security@apache.org", "published": "2025-06-06T15:15:23.883", - "lastModified": "2025-06-10T16:15:36.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:24:00.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.13.0", + "versionEndExcluding": "2.1.0", + "matchCriteriaId": "834EF91B-E4A3-45F8-9D09-8252C82B2F9D" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/r62lkqrr739wvcb60j6ql6q63rh4bxx5", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory", + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/28/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28386.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28386.json index 8231f125f52..e089bc9f173 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28386.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28386.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28386", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T14:15:20.713", - "lastModified": "2025-06-17T19:15:26.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:06:04.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openc3:cosmos:6.0.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9690AE92-0F94-4490-9F63-5AA20ED6E609" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openc3:cosmos:6.0.0:*:*:*:open_source:*:*:*", + "matchCriteriaId": "7248EE06-0D64-4126-8FF4-E22F7E071753" + } + ] + } + ] + } + ], "references": [ { "url": "https://openc3.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://visionspace.com/openc3-cosmos-a-security-assessment-of-an-open-source-mission-framework/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://visionspace.com/openc3-cosmos-a-security-assessment-of-an-open-source-mission-framework/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32875.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32875.json index cc2556ca1e6..e3075c3f9e5 100644 --- a/CVE-2025/CVE-2025-328xx/CVE-2025-32875.json +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32875.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32875", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-20T14:15:27.730", - "lastModified": "2025-06-20T15:15:19.713", + "lastModified": "2025-06-23T15:15:27.400", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the COROS application through 3.8.12 for Android. Bluetooth pairing and bonding is neither initiated nor enforced by the application itself. Also, the watch does not enforce pairing and bonding. As a result, any data transmitted via BLE remains unencrypted, allowing attackers within Bluetooth range to eavesdrop on the communication. Furthermore, even if a user manually initiates pairing and bonding in the Android settings, the application continues to transmit data without requiring the watch to be bonded. This fallback behavior enables attackers to exploit the communication, for example, by conducting an active machine-in-the-middle attack." + }, + { + "lang": "es", + "value": "Se detect\u00f3 un problema en la aplicaci\u00f3n COROS hasta la versi\u00f3n 3.8.12 para Android. El emparejamiento y la vinculaci\u00f3n Bluetooth no se inician ni se aplican por la propia aplicaci\u00f3n. Adem\u00e1s, el reloj no aplica el emparejamiento y la vinculaci\u00f3n. Como resultado, los datos transmitidos mediante BLE permanecen sin cifrar, lo que permite a los atacantes dentro del alcance de Bluetooth interceptar la comunicaci\u00f3n. Adem\u00e1s, incluso si un usuario inicia manualmente el emparejamiento y la vinculaci\u00f3n en la configuraci\u00f3n de Android, la aplicaci\u00f3n contin\u00faa transmitiendo datos sin necesidad de vincular el reloj. Este comportamiento de respaldo permite a los atacantes explotar la comunicaci\u00f3n, por ejemplo, mediante un ataque de m\u00e1quina en el medio (MAI)." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" + "integrityImpact": "NONE", + "availabilityImpact": "NONE" }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 + "exploitabilityScore": 2.1, + "impactScore": 3.6 } ] }, diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4043.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4043.json index e62416ac31e..59b866d3acc 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4043.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4043.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4043", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-05-07T21:16:04.643", - "lastModified": "2025-05-08T16:15:28.283", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T15:02:15.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -105,14 +105,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ug65-868m-ea_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "60.0.0.46", + "matchCriteriaId": "F0FBC40D-47AB-4D0C-AA3F-674D7FB5DD69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ug65-868m-ea:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60AEB147-CFDB-424E-8914-DDBBFDACDF72" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-126-02", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.milesight.com/iot/resources/download-center/#firmware-ug65", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4135.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4135.json index 8bd24549047..cc6941404a0 100644 --- a/CVE-2025/CVE-2025-41xx/CVE-2025-4135.json +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4135.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4135", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-30T18:15:48.400", - "lastModified": "2025-05-02T13:53:40.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:13:00.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,26 +124,74 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:wg302v2_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.2.9", + "matchCriteriaId": "03E6FF23-0662-40D5-A414-125A33845001" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:wg302v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55487992-36DA-45AB-8D58-E440D98E116D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_WG302v2/Command_injection-basic_settings_handler-static-ip-update/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.306626", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.306626", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.560779", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.netgear.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4139.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4139.json index 66f2fe1799c..79ddc02ea7b 100644 --- a/CVE-2025/CVE-2025-41xx/CVE-2025-4139.json +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4139.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4139", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-30T21:15:55.003", - "lastModified": "2025-05-02T13:53:40.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:13:27.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,26 +124,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:ex6120_firmware:1.0.0.68:*:*:*:*:*:*:*", + "matchCriteriaId": "0DA3026E-B60B-4B18-B41A-71F35713C67D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C6DFDB6-1D7A-459A-8D30-FD4900ED718B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_ex6120/Buffer_overflow-fwAcosCgiInbound-port_end/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.306631", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.306631", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.560785", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.netgear.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45001.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45001.json index 11b35583f32..217823a5397 100644 --- a/CVE-2025/CVE-2025-450xx/CVE-2025-45001.json +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45001.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45001", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-09T17:15:29.157", - "lastModified": "2025-06-12T16:06:47.857", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:18:43.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:numan:react-native-keys:0.7.11:*:*:*:*:*:*:*", + "matchCriteriaId": "C28ED9CD-FA1A-4DB8-9877-CF717ACEC6D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/ch3tanbug/44aedff79dd5d2d6beadbffcd01e0de5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://github.com/ch3tanbug/vulnerability-research/tree/main/CVE-2025-45001", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/ch3tanbug/44aedff79dd5d2d6beadbffcd01e0de5", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45002.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45002.json index a14137ddae4..4f3f4465ee7 100644 --- a/CVE-2025/CVE-2025-450xx/CVE-2025-45002.json +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45002.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45002", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-09T17:15:29.450", - "lastModified": "2025-06-12T16:06:47.857", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:15:58.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codervivek:vigybag:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "AA62C4F9-303D-463B-A471-06B720A03E6D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ch3tanbug/vulnerability-research/tree/main/CVE-2025-45002", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ch3tanbug/vulnerability-research/tree/main/CVE-2025-45002", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json index 46243aa8495..5b64c63a502 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45855.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45855", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-03T14:15:48.750", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:25:39.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:erupt:erupt:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.12.19", + "matchCriteriaId": "70AF82F0-ADCA-4719-B2B3-21DCE99B8423" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Cafe-Tea/b72d442be434e1dafe7810c938892b06", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/erupts/erupt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.erupt.xyz/#%21/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json b/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json index 88c9bc6d3d7..3cd9ab31659 100644 --- a/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json +++ b/CVE-2025/CVE-2025-460xx/CVE-2025-46096.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46096", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-13T13:15:21.710", - "lastModified": "2025-06-16T12:32:18.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:08:37.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,14 +55,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:noear:solon:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "8B8D350B-B51B-48B9-A7CF-A2D9371C1ED6" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yaoyao-cool/1b7d80930fea88b6fd4839646cedc437", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/opensolon/solon/issues/357", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46101.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46101.json new file mode 100644 index 00000000000..e1ab14f3b74 --- /dev/null +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46101.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-46101", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T15:15:27.793", + "lastModified": "2025-06-23T15:15:27.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in Beakon Software Beakon Learning Management System Sharable Content Object Reference Model (SCORM) version before 5.4.3 allows a remote attacker to obtain sensitive information via the ks parameter in json_scorm.php file" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/200942/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46721.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46721.json index f181c7b92ef..b0a8c6a455a 100644 --- a/CVE-2025/CVE-2025-467xx/CVE-2025-46721.json +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46721.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46721", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-13T16:15:31.750", - "lastModified": "2025-05-13T20:15:30.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:55:07.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -73,30 +95,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nosurf_project:nosurf:*:*:*:*:*:go:*:*", + "versionEndExcluding": "1.2.0", + "matchCriteriaId": "C2513CBF-78BE-420F-9448-6C4226E36EC9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/advisories/GHSA-rq77-p4h8-4crw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/justinas/nosurf-cve-2025-46721", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/justinas/nosurf/commit/ec9bb776d8e5ba9e906b6eb70428f4e7b009feee", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/justinas/nosurf/releases/tag/v1.2.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/justinas/nosurf/security/advisories/GHSA-w9hf-35q4-vcjw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/advisories/GHSA-rq77-p4h8-4crw", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4727.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4727.json index 134276d096a..d902b2fb68b 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4727.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4727.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4727", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-15T23:15:59.470", - "lastModified": "2025-05-16T14:42:18.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T15:14:50.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,38 +124,88 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:meteor:meteor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.2", + "matchCriteriaId": "DB308F33-2847-44F3-9B14-657579A39E3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/meteor/meteor/commit/f7ea6817b90952baaea9baace2a3b4366fee6a63", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch", + "Issue Tracking" + ] }, { "url": "https://github.com/meteor/meteor/issues/13713", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/meteor/meteor/pull/13721", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/meteor/meteor/releases/tag/release/METEOR%403.2.2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.309029", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309029", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.570441", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.570441", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-47xx/CVE-2025-4792.json b/CVE-2025/CVE-2025-47xx/CVE-2025-4792.json index cc2ab9fd68b..26467bb5a8d 100644 --- a/CVE-2025/CVE-2025-47xx/CVE-2025-4792.json +++ b/CVE-2025/CVE-2025-47xx/CVE-2025-4792.json @@ -2,8 +2,8 @@ "id": "CVE-2025-4792", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-16T18:16:11.280", - "lastModified": "2025-05-19T13:35:20.460", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:36.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-fb7e880a8c21bdec1f4d3953a2c57bcc582b95ffc83513c7d709f45c15d60504.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309101", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309101", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.572481", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48700.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48700.json new file mode 100644 index 00000000000..0e9fe5d35c0 --- /dev/null +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48700.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-48700", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T15:15:27.930", + "lastModified": "2025-06-23T15:15:27.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 and 10.1. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, specifically involving crafted tag structures and attribute values that include an @import directive and other script injection vectors. The vulnerability is triggered when a user views a crafted e-mail message in the Classic UI, requiring no additional user interaction." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wiki.zimbra.com/wiki/Security_Center", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48705.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48705.json index c82407b8d23..5b420e5ce2d 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48705.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48705.json @@ -2,16 +2,55 @@ "id": "CVE-2025-48705", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-20T14:15:29.633", - "lastModified": "2025-06-20T14:15:29.633", + "lastModified": "2025-06-23T15:15:28.067", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in COROS PACE 3 through 3.0808.0. Due to a NULL pointer dereference vulnerability, sending a crafted BLE message forces the device to reboot." + }, + { + "lang": "es", + "value": "Se detect\u00f3 un problema en COROS PACE 3 a 3.0808.0. Debido a una vulnerabilidad de desreferencia de puntero nulo, el env\u00edo de un mensaje BLE manipulado obliga al dispositivo a reiniciarse." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://syss.de", diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48748.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48748.json index 91e65914a47..4d09f4ceb1f 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48748.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48748.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48748", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-29T15:15:34.137", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:37:52.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.0.7784.0", + "matchCriteriaId": "6C6CC058-AF99-4612-A710-D1B370E6E20A" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.netwrix.com/t/adv-2025-013-hard-coded-password-in-netwrix-directory-manager-formerly-imanami-groupid-v10-and-earlier/13945", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-490xx/CVE-2025-49080.json b/CVE-2025/CVE-2025-490xx/CVE-2025-49080.json index b3527a97031..8e1c7a94dca 100644 --- a/CVE-2025/CVE-2025-490xx/CVE-2025-49080.json +++ b/CVE-2025/CVE-2025-490xx/CVE-2025-49080.json @@ -2,8 +2,8 @@ "id": "CVE-2025-49080", "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2025-06-12T17:15:29.193", - "lastModified": "2025-06-17T19:15:32.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:09:31.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndIncluding": "13.54", + "matchCriteriaId": "0FBA6CCF-7369-459B-9B71-5ADFCA00EFB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.absolute.com/platform/security-information/vulnerability-archive/cve-2025-49080", - "source": "SecurityResponse@netmotionsoftware.com" + "source": "SecurityResponse@netmotionsoftware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5049.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5049.json index 0e3d90d5d0a..bc5cc33a6a3 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5049.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5049.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5049", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T19:16:09.937", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:34.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/e837c056f1ced605a9574541c7bf9861982bbf52ac5da3a5c5b637dbbadb49b7-exploit.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309868", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309868", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.581278", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5050.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5050.json index 98c72c3b5ff..f249866ec35 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5050.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5050.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5050", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T19:16:10.147", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:31.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-bbcf0f842f1c5385430b6992995a8eb068c58dfbaae38ffb7df1d2c69041bc7c.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309869", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309869", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.581282", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5051.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5051.json index f92742956ee..0bb1f4dc731 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5051.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5051.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5051", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T20:15:33.770", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:29.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-4c025558ea74cba6eda5d8483c3d65f16de258eef4b3a5fcc50b4278c120e558.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309870", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309870", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.581283", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5052.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5052.json index c9b3d6a879d..4339446f9df 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5052.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5052.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5052", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-21T21:16:03.650", - "lastModified": "2025-05-23T15:55:02.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:27.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-bbcf0f842f1c5385430b6992995a8eb068c58dfbaae38ffb7df1d2c69041bc7c1.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309871", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309871", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.581284", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5075.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5075.json index 7f212219512..46ccdf7f07d 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5075.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5075.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5075", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-22T13:15:58.467", - "lastModified": "2025-05-23T15:55:02.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:26.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-5c08f30e4ae57f2e4b89fbe5a5d6c540e3c359e1e5b12a00d4a6257b1b9fc935.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309955", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309955", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.581296", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-50xx/CVE-2025-5076.json b/CVE-2025/CVE-2025-50xx/CVE-2025-5076.json index f39e5bf8173..1d49bd8637c 100644 --- a/CVE-2025/CVE-2025-50xx/CVE-2025-5076.json +++ b/CVE-2025/CVE-2025-50xx/CVE-2025-5076.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5076", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-22T14:16:08.927", - "lastModified": "2025-05-23T15:55:02.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:24.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-9829d8aeaf006c1a3474f4cbcc27d3dd30b5e2053444fd36b805b785f65b2e3e.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.309956", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.309956", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.581297", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5110.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5110.json index a48b2c8b96c..29ce5eba8ef 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5110.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5110.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5110", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-23T14:15:30.023", - "lastModified": "2025-05-23T15:54:42.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:22.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-325e5cf47259d3b511d301c84b53946fd1b78226df7291d441103ef5295f216e.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310087", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310087", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.582957", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5111.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5111.json index 3861ef92f8d..68c95cd9e4e 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5111.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5111.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5111", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-23T14:15:30.207", - "lastModified": "2025-05-23T15:54:42.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:51:20.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/exploit/exploit-b08607fc683b518b37423881e5ee902fdb2a7c04ac57f7ff725df240e171f5e3.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310088", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310088", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.582958", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-525xx/CVE-2025-52542.json b/CVE-2025/CVE-2025-525xx/CVE-2025-52542.json new file mode 100644 index 00000000000..0596f5c6787 --- /dev/null +++ b/CVE-2025/CVE-2025-525xx/CVE-2025-52542.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-52542", + "sourceIdentifier": "dd59f033-460c-4b88-a075-d4d3fedb6191", + "published": "2025-06-23T14:15:26.753", + "lastModified": "2025-06-23T14:15:26.753", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52875.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52875.json new file mode 100644 index 00000000000..b0cff8ca441 --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52875.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-52875", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-06-23T15:15:28.260", + "lastModified": "2025-06-23T15:15:28.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2025.03.3 a DOM-based XSS at the Performance Monitor page was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52876.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52876.json new file mode 100644 index 00000000000..24cf5a21fab --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52876.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-52876", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-06-23T15:15:28.447", + "lastModified": "2025-06-23T15:15:28.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2025.03.3 reflected XSS on the favoriteIcon page was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52877.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52877.json new file mode 100644 index 00000000000..03a4f4067ac --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52877.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-52877", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-06-23T15:15:28.603", + "lastModified": "2025-06-23T15:15:28.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2025.03.3 reflected XSS on diskUsageBuildsStats page was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52878.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52878.json new file mode 100644 index 00000000000..f680fc0b4c9 --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52878.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-52878", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-06-23T15:15:28.770", + "lastModified": "2025-06-23T15:15:28.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2025.03.3 usernames were exposed to the users without proper permissions" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52879.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52879.json new file mode 100644 index 00000000000..390e094a3db --- /dev/null +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52879.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-52879", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-06-23T15:15:28.933", + "lastModified": "2025-06-23T15:15:28.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2025.03.3 reflected XSS in the NPM Registry integration was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52937.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52937.json index ed153f9eaa3..7394821bbe6 100644 --- a/CVE-2025/CVE-2025-529xx/CVE-2025-52937.json +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52937.json @@ -2,7 +2,7 @@ "id": "CVE-2025-52937", "sourceIdentifier": "cve_disclosure@tech.gov.sg", "published": "2025-06-23T10:15:27.717", - "lastModified": "2025-06-23T10:15:27.717", + "lastModified": "2025-06-23T14:15:27.203", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -57,6 +57,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], "references": [ { "url": "https://github.com/PointCloudLibrary/pcl/commit/2f9dc390c6769fbd821fafa0e16f4707ed7c5d79", diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52967.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52967.json new file mode 100644 index 00000000000..55ec5ab9b15 --- /dev/null +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52967.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-52967", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T15:15:29.163", + "lastModified": "2025-06-23T15:15:29.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mlflow/mlflow/issues/15944", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mlflow/mlflow/pull/15970", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mlflow/mlflow/releases/tag/v3.1.0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52968.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52968.json new file mode 100644 index 00000000000..a487e5258c0 --- /dev/null +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52968.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2025-52968", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-23T15:15:29.350", + "lastModified": "2025-06-23T15:15:29.350", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-420" + } + ] + } + ], + "references": [ + { + "url": "https://cgit.freedesktop.org/xdg/xdg-utils/tag/?h=v1.2.1", + "source": "cve@mitre.org" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/06/23/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5330.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5330.json index 8ebcefba55e..5ac76ca8197 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5330.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5330.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5330", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T22:15:22.747", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:37:01.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C3D4BD-07C8-4E11-8B6C-6CBBA66F0725" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/r3ng4f/FreeFloat_1/blob/main/01-exploit.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310503", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310503", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.585402", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/r3ng4f/FreeFloat_1/blob/main/01-exploit.txt", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5331.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5331.json index c0304fedf99..30e45e02685 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5331.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5331.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5331", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T22:15:22.940", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:35:13.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pcman_ftp_server_project:pcman_ftp_server:2.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "33ACD9B6-5E83-4D68-A829-FA67A55CA6A3" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/r3ng4f/PCMan_1/blob/main/exploit02.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310504", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310504", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.585404", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/r3ng4f/PCMan_1/blob/main/exploit02.txt", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5641.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5641.json index 13fa16ed5d9..9fa5b76fe00 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5641.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5641.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5641", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T07:15:23.317", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:37:57.193", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -127,34 +127,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE116081-11B9-4F5B-B0A1-62B6FAEAC449" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1oG5IC7qhL_SJsIHpnWp7MZlWJGYt8qWZ/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24230", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24230#issuecomment-2919612676", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311129", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311129", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586909", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json index 04539784ec8..ca881da07c2 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5642.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5642", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T07:15:23.583", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:38:11.337", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -127,34 +127,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE116081-11B9-4F5B-B0A1-62B6FAEAC449" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1joXpofhKSeb3uJ034ayVuWIoJj08gm_9/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24231#issuecomment-2918848163", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311130", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311130", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586910", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json index 065c52082f8..7c193c0ac80 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5643.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5643", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T07:15:23.780", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:38:25.483", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -127,34 +127,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE116081-11B9-4F5B-B0A1-62B6FAEAC449" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1XsoyD7lMC-9a9Cxhld8sdEE-0PF3lxvB/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24232#issuecomment-2918841776", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311131", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311131", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586912", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5644.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5644.json index 83612ec34ca..887085bf663 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5644.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5644.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5644", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T07:15:23.990", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:38:45.623", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -131,34 +131,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE116081-11B9-4F5B-B0A1-62B6FAEAC449" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1VtiMMp7ECun3sq3AwlqQrU9xEPA45eOz/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24233", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24233#issuecomment-2918847833", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311132", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311132", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586921", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5645.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5645.json index 407ae101d04..46b190f85e3 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5645.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5645.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5645", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T08:15:20.973", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:39:01.727", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -127,34 +127,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE116081-11B9-4F5B-B0A1-62B6FAEAC449" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1LVaraZB30lJXtrvp-4bcEJrZYFJb2bfc/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24234", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24234#issuecomment-2918847551", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311133", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311133", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586922", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5646.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5646.json index 8d5f2e8cdcd..930a648fd81 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5646.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5646.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5646", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T08:15:21.197", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:40:23.430", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -127,34 +127,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE116081-11B9-4F5B-B0A1-62B6FAEAC449" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1PYNtV7Kx2OEgM9Cemb5FBlMJH_J1wux0/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24235", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24235#issuecomment-2918847213", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311134", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311134", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586923", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5647.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5647.json index cbf7f3d42ee..b8607e95ba4 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5647.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5647.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5647", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T09:15:22.847", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-23T14:40:09.040", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -127,34 +127,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FE116081-11B9-4F5B-B0A1-62B6FAEAC449" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/16ApwSAKLDqm1qzJLe-uUZSCyy8HNG965/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24237", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/radareorg/radare2/issues/24237#issuecomment-2918846137", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311135", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311135", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586928", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5875.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5875.json index 524d720a238..1931ee4f784 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5875.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5875.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5875", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T12:15:21.890", - "lastModified": "2025-06-12T19:15:20.893", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-23T14:21:01.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,32 +122,94 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-ipc544ep-w4_firmware:1.0.9:build240428_rel69493n:*:*:*:*:*:*", + "matchCriteriaId": "EF8F1F10-03EF-4711-B0AF-DE2BD516C785" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-ipc544ep-w4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F78FBC4D-FEFC-4CD1-8EA8-C21BF37A8370" + } + ] + } + ] } ], "references": [ { "url": "https://locrian-lightning-dc7.notion.site/TL-IPC544EP-W4-1f98e5e2b1a280ae9862d49391d95651", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311634", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311634", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.581366", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tp-link.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://locrian-lightning-dc7.notion.site/TL-IPC544EP-W4-1f98e5e2b1a280ae9862d49391d95651", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6019.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6019.json index f7a90cfd9ef..261eeb2296f 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6019.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6019.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6019", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-19T12:15:19.727", - "lastModified": "2025-06-19T12:15:19.727", + "lastModified": "2025-06-23T14:15:27.323", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -52,6 +52,42 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:9320", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9321", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9322", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9323", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9324", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9325", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9326", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9327", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:9328", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-6019", "source": "secalert@redhat.com" @@ -60,6 +96,10 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370051", "source": "secalert@redhat.com" }, + { + "url": "https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt", + "source": "secalert@redhat.com" + }, { "url": "http://www.openwall.com/lists/oss-security/2025/06/17/5", "source": "af854a3a-2127-422b-91ae-364da2661108" @@ -75,6 +115,14 @@ { "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00018.html", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://news.ycombinator.com/item?id=44325861", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6368.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6368.json index ed6204c0536..24b39254634 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6368.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6368.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6368", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T22:15:19.407", - "lastModified": "2025-06-20T22:15:19.407", + "lastModified": "2025-06-23T15:15:29.943", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in D-Link DIR-619L 2.06B01. It has been rated as critical. This issue affects the function formSetEmail of the file /goform/formSetEmail. The manipulation of the argument curTime/config.smtp_email_subject leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DIR-619L 2.06B01. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n formSetEmail del archivo /goform/formSetEmail. La manipulaci\u00f3n del argumento curTime/config.smtp_email_subject provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6369.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6369.json index cd0db129d40..f6c4af67068 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6369.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6369.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6369", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T22:15:19.613", - "lastModified": "2025-06-20T22:15:19.613", + "lastModified": "2025-06-23T15:15:30.093", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in D-Link DIR-619L 2.06B01. Affected is the function formdumpeasysetup of the file /goform/formdumpeasysetup. The manipulation of the argument curTime/config.save_network_enabled leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en D-Link DIR-619L 2.06B01. La funci\u00f3n formdumpeasysetup del archivo /goform/formdumpeasysetup est\u00e1 afectada. La manipulaci\u00f3n del argumento curTime/config.save_network_enabled provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6370.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6370.json index 32d8df46ffd..f42d7dd3488 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6370.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6370.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6370", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T22:15:19.800", - "lastModified": "2025-06-20T22:15:19.800", + "lastModified": "2025-06-23T15:15:30.220", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in D-Link DIR-619L 2.06B01. Affected by this vulnerability is the function formWlanGuestSetup of the file /goform/formWlanGuestSetup. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en D-Link DIR-619L 2.06B01. Esta vulnerabilidad afecta a la funci\u00f3n formWlanGuestSetup del archivo /goform/formWlanGuestSetup. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6371.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6371.json index 5151ee28928..e59e33ac5d7 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6371.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6371.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6371", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T23:15:19.050", - "lastModified": "2025-06-20T23:15:19.050", + "lastModified": "2025-06-23T15:15:30.370", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in D-Link DIR-619L 2.06B01. Affected by this issue is the function formSetEnableWizard of the file /goform/formSetEnableWizard. The manipulation of the argument curTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en D-Link DIR-619L 2.06B01. Este problema afecta a la funci\u00f3n formSetEnableWizard del archivo /goform/formSetEnableWizard. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -147,6 +151,10 @@ { "url": "https://www.dlink.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6375.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6375.json index a48578d770d..b72a6147973 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6375.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6375.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6375", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T01:15:29.463", - "lastModified": "2025-06-21T01:15:29.463", + "lastModified": "2025-06-23T15:15:30.500", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in poco up to 1.14.1. It has been rated as problematic. Affected by this issue is the function MultipartInputStream of the file Net/src/MultipartReader.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.14.2 is able to address this issue. The patch is identified as 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en poco hasta la versi\u00f3n 1.14.1. Se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n MultipartInputStream del archivo Net/src/MultipartReader.cpp. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. El ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 1.14.2 puede solucionar este problema. El parche se identifica como 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf. Se recomienda actualizar el componente afectado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -148,6 +152,10 @@ { "url": "https://vuldb.com/?submit.597446", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/pocoproject/poco/issues/4915", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6393.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6393.json index 74dda44d250..e48cdc103a2 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6393.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6393.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6393", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T01:15:29.650", - "lastModified": "2025-06-21T01:15:29.650", + "lastModified": "2025-06-23T15:15:30.647", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B20230809.1615/4.0.0-B20230531.1404/4.0.0-B20230721.1521/4.1.2cu.5232_B20210713. It has been classified as critical. Affected is an unknown function of the file /boafrm/formIPv6Addr of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK A702R, A3002R, A3002RU y EX1200T 3.0.0-B20230809.1615/4.0.0-B20230531.1404/4.0.0-B20230721.1521/4.1.2cu.5232_B20210713. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /boafrm/formIPv6Addr del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento \"submit-url\" provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -156,6 +160,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/awindog/cve/blob/main/688/15.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6394.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6394.json index c96c4ddc741..55cc7c04eca 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6394.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6394.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6394", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T02:15:20.247", - "lastModified": "2025-06-21T02:15:20.247", + "lastModified": "2025-06-23T15:15:30.777", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /add_reserve.php. The manipulation of the argument firstname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Online Hotel Reservation System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /add_reserve.php. La manipulaci\u00f3n del argumento firstname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.597662", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/aoc1997/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6403.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6403.json index 3795572be8a..3bbca602850 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6403.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6403.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6403", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T10:15:22.360", - "lastModified": "2025-06-21T10:15:22.360", + "lastModified": "2025-06-23T15:15:30.903", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects School Fees Payment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects School Fees Payment System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /student.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.597758", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/tuooo/CVE/issues/16", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6404.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6404.json index dc98fea8eac..bfbc568ec65 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6404.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6404.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6404", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T12:15:19.313", - "lastModified": "2025-06-21T12:15:19.313", + "lastModified": "2025-06-23T15:15:31.030", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Campcodes Online Teacher Record Management System 1.0. Affected is an unknown function of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Campcodes Online Teacher Record Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/search.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.campcodes.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ASantsSec/CVE/issues/13", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6405.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6405.json index cc41d524ffc..bd12bbc601c 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6405.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6405.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6405", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T14:15:19.557", - "lastModified": "2025-06-21T14:15:19.557", + "lastModified": "2025-06-23T15:15:31.153", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Campcodes Online Teacher Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit-teacher-detail.php. The manipulation of the argument editid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad cr\u00edtica en Campcodes Online Teacher Record Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/edit-teacher-detail.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.campcodes.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ASantsSec/CVE/issues/14", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6406.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6406.json index 1e6204948ff..f1194d119c2 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6406.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6406.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6406", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T14:15:19.777", - "lastModified": "2025-06-21T14:15:19.777", + "lastModified": "2025-06-23T15:15:31.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Campcodes Online Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /hms/forgot-password.php. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Campcodes Online Hospital Management System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /hms/forgot-password.php. La manipulaci\u00f3n del argumento fullname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.campcodes.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ASantsSec/CVE/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6407.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6407.json index 612bb7b42c4..c3691f8a155 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6407.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6407.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6407", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T15:15:21.213", - "lastModified": "2025-06-21T15:15:21.213", + "lastModified": "2025-06-23T15:15:31.400", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Campcodes Online Hospital Management System 1.0. This affects an unknown part of the file /user-login.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en Campcodes Online Hospital Management System 1.0. Esta afecta a una parte desconocida del archivo /user-login.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.campcodes.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ASantsSec/CVE/issues/12", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6408.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6408.json index 3276b54b478..1209e6c291d 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6408.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6408.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6408", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T15:15:21.397", - "lastModified": "2025-06-21T15:15:21.397", + "lastModified": "2025-06-23T15:15:31.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Campcodes Online Hospital Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /doctor/search.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Campcodes Online Hospital Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /doctor/search.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.campcodes.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ASantsSec/CVE/issues/15", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6413.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6413.json index ac36c22278d..5a2bd962b0c 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6413.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6413.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6413", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T18:15:24.720", - "lastModified": "2025-06-21T18:15:24.720", + "lastModified": "2025-06-23T15:15:31.657", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PHPGurukul Art Gallery Management System 1.1. This affects an unknown part of the file /admin/changeimage1.php. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PHPGurukul Art Gallery Management System 1.1. Esta afecta a una parte desconocida del archivo /admin/changeimage1.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598229", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/86", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6414.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6414.json index 651ea15b001..4ed1d16504f 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6414.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6414.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6414", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T19:15:22.377", - "lastModified": "2025-06-21T19:15:22.377", + "lastModified": "2025-06-23T15:15:31.800", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Art Gallery Management System 1.1. This vulnerability affects unknown code of the file /admin/changeimage2.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Art Gallery Management System 1.1. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/changeimage2.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598230", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/87", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6415.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6415.json index a06c87b38ce..643191a3a19 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6415.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6415.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6415", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T19:15:22.583", - "lastModified": "2025-06-21T19:15:22.583", + "lastModified": "2025-06-23T15:15:31.930", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Art Gallery Management System 1.1. This issue affects some unknown processing of the file /admin/changeimage3.php. The manipulation of the argument editid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Art Gallery Management System 1.1. Este problema afecta a un procesamiento desconocido del archivo /admin/changeimage3.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598231", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/88", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6416.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6416.json index 20620f90d73..bece653593a 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6416.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6416.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6416", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T20:15:26.237", - "lastModified": "2025-06-21T20:15:26.237", + "lastModified": "2025-06-23T15:15:32.057", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Art Gallery Management System 1.1. Affected is an unknown function of the file /admin/changeimage4.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Art Gallery Management System 1.1. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /admin/changeimage4.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598232", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/89", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6417.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6417.json index e60fa684ffa..699343dd4b0 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6417.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6417.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6417", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T20:15:27.210", - "lastModified": "2025-06-21T20:15:27.210", + "lastModified": "2025-06-23T15:15:32.183", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul Art Gallery Management System 1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/add-artist.php. The manipulation of the argument awarddetails leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en PHPGurukul Art Gallery Management System 1.1, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/add-artist.php. La manipulaci\u00f3n del argumento awarddetails provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598233", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/90", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6418.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6418.json index 1022e67f047..11ea66f7035 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6418.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6418.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6418", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T21:15:23.713", - "lastModified": "2025-06-21T21:15:23.713", + "lastModified": "2025-06-23T15:15:32.307", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit_query_account.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Online Hotel Reservation System 1.0, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /admin/edit_query_account.php. La manipulaci\u00f3n del argumento \"Name\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598243", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzb1388/cve/issues/4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6419.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6419.json index 605400acac7..a9fbfd796e0 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6419.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6419.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6419", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T21:15:24.453", - "lastModified": "2025-06-21T21:15:24.453", + "lastModified": "2025-06-23T15:15:32.433", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/edit_room.php. The manipulation of the argument room_type leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Online Hotel Reservation System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /admin/edit_room.php. La manipulaci\u00f3n del argumento \"room_type\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598245", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzb1388/cve/issues/5", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6420.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6420.json index 58be94645aa..3cea03585ed 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6420.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6420.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6420", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T22:15:21.687", - "lastModified": "2025-06-21T22:15:21.687", + "lastModified": "2025-06-23T15:15:32.560", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/add_room.php. The manipulation of the argument room_type leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Online Hotel Reservation System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/add_room.php. La manipulaci\u00f3n del argumento \"room_type\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598246", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzb1388/cve/issues/6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6421.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6421.json index ea6abd8e13f..0732b00b359 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6421.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6421.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6421", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T22:15:21.870", - "lastModified": "2025-06-21T22:15:21.870", + "lastModified": "2025-06-23T15:15:32.680", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/add_account.php. The manipulation of the argument name/admin_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Online Hotel Reservation System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/add_account.php. La manipulaci\u00f3n del argumento name/admin_id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +148,10 @@ { "url": "https://vuldb.com/?submit.598584", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzb1388/cve/issues/7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6452.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6452.json index 5eae4bdc43c..e8db1c6aaef 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6452.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6452.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6452", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T03:15:30.703", - "lastModified": "2025-06-22T03:15:30.703", + "lastModified": "2025-06-23T15:15:32.813", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in CodeAstro Patient Record Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the component Generate New Report Page. The manipulation of the argument Patient Name/Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en CodeAstro Patient Record Management System 1.0. Se ha clasificado como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del componente Generate New Report Page. La manipulaci\u00f3n del argumento \"Patient Name/Name\" provoca Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +148,10 @@ { "url": "https://vuldb.com/?submit.598711", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Vanshdhawan188/CodeAstro-Online-Healthcare-Patient-Record-Management-System/blob/main/CodeAstro-Online-Healthcare-Patient-Record-Management-System.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6453.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6453.json index 7ae31960d46..acae3fd9f62 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6453.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6453.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6453", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T03:15:31.490", - "lastModified": "2025-06-22T03:15:31.490", + "lastModified": "2025-06-23T15:15:32.937", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in diyhi bbs 6.8. Affected is the function Add of the file /src/main/java/cms/web/action/template/ForumManageAction.java of the component API. The manipulation of the argument dirName leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en diyhi bbs 6.8. La funci\u00f3n \"Add\" del archivo /src/main/java/cms/web/action/template/ForumManageAction.java de la API del componente se ve afectada. La manipulaci\u00f3n del argumento dirName provoca un path traversal. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.598862", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250618-01.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6455.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6455.json index 8f396f025c7..dd2ac3047bf 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6455.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6455.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6455", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T03:15:31.667", - "lastModified": "2025-06-22T03:15:31.667", + "lastModified": "2025-06-23T15:15:33.073", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in code-projects Online Hotel Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file /messageexec.php. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Hotel Reservation System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /messageexec.php. La manipulaci\u00f3n del argumento \"Name\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598876", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/blueandhack/cve/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6456.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6456.json index 9a6100ee4df..070a594ef91 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6456.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6456.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6456", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T04:15:28.673", - "lastModified": "2025-06-22T04:15:28.673", + "lastModified": "2025-06-23T15:15:33.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file /reservation/order.php. The manipulation of the argument Start leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Hotel Reservation System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /reservation/order.php. La manipulaci\u00f3n del argumento Start provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598877", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/blueandhack/cve/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6457.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6457.json index 439370e0623..36abef260d1 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6457.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6457.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6457", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T04:15:33.007", - "lastModified": "2025-06-22T04:15:33.007", + "lastModified": "2025-06-23T15:15:33.357", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Online Hotel Reservation System 1.0. This affects an unknown part of the file /reservation/demo.php. The manipulation of the argument Start leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Hotel Reservation System 1.0. Esta afecta a una parte desconocida del archivo /reservation/demo.php. La manipulaci\u00f3n del argumento Start provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598878", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/blueandhack/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6458.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6458.json index d3d03ccee52..62ab44caf6b 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6458.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6458.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6458", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T05:15:25.577", - "lastModified": "2025-06-22T05:15:25.577", + "lastModified": "2025-06-23T15:15:33.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Online Hotel Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/execedituser.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Hotel Reservation System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/execedituser.php. La manipulaci\u00f3n del argumento \"userid\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598883", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Kristin5634487/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6466.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6466.json index 38a34dcd93c..d7ad378e30c 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6466.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6466.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6466", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T05:15:25.840", - "lastModified": "2025-06-22T05:15:25.840", + "lastModified": "2025-06-23T15:15:34.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ageerle ruoyi-ai 2.0.0 and classified as critical. Affected by this issue is the function speechToTextTranscriptionsV2/upload of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/service/impl/SseServiceImpl.java. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 4e93ac86d4891c59ecfcd27c051de9b3c5379315. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en ageerle ruoyi-ai 2.0.0, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n speechToTextTranscriptionsV2/upload del archivo ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/service/impl/SseServiceImpl.java. La manipulaci\u00f3n del argumento File permite una carga sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 2.0.1 puede solucionar este problema. El parche se identifica como 4e93ac86d4891c59ecfcd27c051de9b3c5379315. Se recomienda actualizar el componente afectado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -148,6 +152,10 @@ { "url": "https://vuldb.com/?submit.598365", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ageerle/ruoyi-ai/issues/9#event-16775988438", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6467.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6467.json index 65b73f94687..13f47d16667 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6467.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6467.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6467", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T06:15:23.623", - "lastModified": "2025-06-22T06:15:23.623", + "lastModified": "2025-06-23T14:15:27.473", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Online Bidding System 1.0. It has been classified as critical. This affects an unknown part of the file /login.php. The manipulation of the argument User leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en code-projects Online Bidding System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /login.php. La manipulaci\u00f3n del argumento \"User\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.598882", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Kristin5634487/cve/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6477.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6477.json index 008dfe5c730..50af1bbb4a3 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6477.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6477.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6477", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-22T13:15:35.120", - "lastModified": "2025-06-22T13:15:35.120", + "lastModified": "2025-06-23T14:15:28.330", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Student Result Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /script/admin/system of the component System Settings Page. The manipulation of the argument School Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Student Result Management System 1.0. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /script/admin/system del componente System Settings Page. La manipulaci\u00f3n del argumento School Name provoca Cross-Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README9.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6498.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6498.json index 9a13b1c3875..94c1a0f2512 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6498.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6498.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6498", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-23T02:15:20.703", - "lastModified": "2025-06-23T02:15:20.703", + "lastModified": "2025-06-23T14:15:28.950", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.601009", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/htacg/tidy-html5/issues/1152", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6499.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6499.json index c13c2f67014..bbca5cecb0a 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6499.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6499.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6499", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-23T03:15:26.717", - "lastModified": "2025-06-23T03:15:26.717", + "lastModified": "2025-06-23T14:15:29.077", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.601011", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/vstakhov/libucl/issues/319", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6500.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6500.json index 32b345ba123..62bf01f1008 100644 --- a/CVE-2025/CVE-2025-65xx/CVE-2025-6500.json +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6500.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6500", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-23T03:15:26.913", - "lastModified": "2025-06-23T03:15:26.913", + "lastModified": "2025-06-23T14:15:29.207", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.601250", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mex135605/cve/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6501.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6501.json index 5633c23f0eb..4d8fc48b060 100644 --- a/CVE-2025/CVE-2025-65xx/CVE-2025-6501.json +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6501.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6501", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-23T03:15:27.100", - "lastModified": "2025-06-23T03:15:27.100", + "lastModified": "2025-06-23T14:15:29.337", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.601251", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mex135605/cve/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 93df659a8cd..5500d093ded 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-23T14:00:19.620330+00:00 +2025-06-23T16:00:28.688260+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-23T13:59:30.220000+00:00 +2025-06-23T15:25:05.683000+00:00 ``` ### Last Data Feed Release @@ -33,37 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299076 +299091 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `15` -- [CVE-2025-23049](CVE-2025/CVE-2025-230xx/CVE-2025-23049.json) (`2025-06-23T12:15:22.603`) -- [CVE-2025-52920](CVE-2025/CVE-2025-529xx/CVE-2025-52920.json) (`2025-06-23T12:15:22.803`) -- [CVE-2025-52921](CVE-2025/CVE-2025-529xx/CVE-2025-52921.json) (`2025-06-23T12:15:22.970`) -- [CVE-2025-52922](CVE-2025/CVE-2025-529xx/CVE-2025-52922.json) (`2025-06-23T12:15:23.150`) -- [CVE-2025-6512](CVE-2025/CVE-2025-65xx/CVE-2025-6512.json) (`2025-06-23T13:15:22.460`) -- [CVE-2025-6513](CVE-2025/CVE-2025-65xx/CVE-2025-6513.json) (`2025-06-23T13:15:23.040`) +- [CVE-2023-47297](CVE-2023/CVE-2023-472xx/CVE-2023-47297.json) (`2025-06-23T15:15:25.940`) +- [CVE-2023-47298](CVE-2023/CVE-2023-472xx/CVE-2023-47298.json) (`2025-06-23T15:15:26.700`) +- [CVE-2023-48978](CVE-2023/CVE-2023-489xx/CVE-2023-48978.json) (`2025-06-23T15:15:26.890`) +- [CVE-2025-2171](CVE-2025/CVE-2025-21xx/CVE-2025-2171.json) (`2025-06-23T14:15:26.437`) +- [CVE-2025-2172](CVE-2025/CVE-2025-21xx/CVE-2025-2172.json) (`2025-06-23T14:15:26.607`) +- [CVE-2025-46101](CVE-2025/CVE-2025-461xx/CVE-2025-46101.json) (`2025-06-23T15:15:27.793`) +- [CVE-2025-48700](CVE-2025/CVE-2025-487xx/CVE-2025-48700.json) (`2025-06-23T15:15:27.930`) +- [CVE-2025-52542](CVE-2025/CVE-2025-525xx/CVE-2025-52542.json) (`2025-06-23T14:15:26.753`) +- [CVE-2025-52875](CVE-2025/CVE-2025-528xx/CVE-2025-52875.json) (`2025-06-23T15:15:28.260`) +- [CVE-2025-52876](CVE-2025/CVE-2025-528xx/CVE-2025-52876.json) (`2025-06-23T15:15:28.447`) +- [CVE-2025-52877](CVE-2025/CVE-2025-528xx/CVE-2025-52877.json) (`2025-06-23T15:15:28.603`) +- [CVE-2025-52878](CVE-2025/CVE-2025-528xx/CVE-2025-52878.json) (`2025-06-23T15:15:28.770`) +- [CVE-2025-52879](CVE-2025/CVE-2025-528xx/CVE-2025-52879.json) (`2025-06-23T15:15:28.933`) +- [CVE-2025-52967](CVE-2025/CVE-2025-529xx/CVE-2025-52967.json) (`2025-06-23T15:15:29.163`) +- [CVE-2025-52968](CVE-2025/CVE-2025-529xx/CVE-2025-52968.json) (`2025-06-23T15:15:29.350`) ### CVEs modified in the last Commit -Recently modified CVEs: `12` +Recently modified CVEs: `95` -- [CVE-2021-38487](CVE-2021/CVE-2021-384xx/CVE-2021-38487.json) (`2025-06-23T12:15:21.893`) -- [CVE-2024-40570](CVE-2024/CVE-2024-405xx/CVE-2024-40570.json) (`2025-06-23T13:59:30.220`) -- [CVE-2024-57394](CVE-2024/CVE-2024-573xx/CVE-2024-57394.json) (`2025-06-23T13:08:14.880`) -- [CVE-2025-27086](CVE-2025/CVE-2025-270xx/CVE-2025-27086.json) (`2025-06-23T13:07:13.993`) -- [CVE-2025-28102](CVE-2025/CVE-2025-281xx/CVE-2025-28102.json) (`2025-06-23T13:09:59.990`) -- [CVE-2025-28367](CVE-2025/CVE-2025-283xx/CVE-2025-28367.json) (`2025-06-23T13:14:02.500`) -- [CVE-2025-29659](CVE-2025/CVE-2025-296xx/CVE-2025-29659.json) (`2025-06-23T13:42:41.780`) -- [CVE-2025-29660](CVE-2025/CVE-2025-296xx/CVE-2025-29660.json) (`2025-06-23T13:40:34.040`) -- [CVE-2025-29840](CVE-2025/CVE-2025-298xx/CVE-2025-29840.json) (`2025-06-23T13:46:22.847`) -- [CVE-2025-29976](CVE-2025/CVE-2025-299xx/CVE-2025-29976.json) (`2025-06-23T13:50:36.603`) -- [CVE-2025-3841](CVE-2025/CVE-2025-38xx/CVE-2025-3841.json) (`2025-06-23T13:06:18.607`) -- [CVE-2025-5419](CVE-2025/CVE-2025-54xx/CVE-2025-5419.json) (`2025-06-23T12:15:23.323`) +- [CVE-2025-6406](CVE-2025/CVE-2025-64xx/CVE-2025-6406.json) (`2025-06-23T15:15:31.280`) +- [CVE-2025-6407](CVE-2025/CVE-2025-64xx/CVE-2025-6407.json) (`2025-06-23T15:15:31.400`) +- [CVE-2025-6408](CVE-2025/CVE-2025-64xx/CVE-2025-6408.json) (`2025-06-23T15:15:31.527`) +- [CVE-2025-6413](CVE-2025/CVE-2025-64xx/CVE-2025-6413.json) (`2025-06-23T15:15:31.657`) +- [CVE-2025-6414](CVE-2025/CVE-2025-64xx/CVE-2025-6414.json) (`2025-06-23T15:15:31.800`) +- [CVE-2025-6415](CVE-2025/CVE-2025-64xx/CVE-2025-6415.json) (`2025-06-23T15:15:31.930`) +- [CVE-2025-6416](CVE-2025/CVE-2025-64xx/CVE-2025-6416.json) (`2025-06-23T15:15:32.057`) +- [CVE-2025-6417](CVE-2025/CVE-2025-64xx/CVE-2025-6417.json) (`2025-06-23T15:15:32.183`) +- [CVE-2025-6418](CVE-2025/CVE-2025-64xx/CVE-2025-6418.json) (`2025-06-23T15:15:32.307`) +- [CVE-2025-6419](CVE-2025/CVE-2025-64xx/CVE-2025-6419.json) (`2025-06-23T15:15:32.433`) +- [CVE-2025-6420](CVE-2025/CVE-2025-64xx/CVE-2025-6420.json) (`2025-06-23T15:15:32.560`) +- [CVE-2025-6421](CVE-2025/CVE-2025-64xx/CVE-2025-6421.json) (`2025-06-23T15:15:32.680`) +- [CVE-2025-6452](CVE-2025/CVE-2025-64xx/CVE-2025-6452.json) (`2025-06-23T15:15:32.813`) +- [CVE-2025-6453](CVE-2025/CVE-2025-64xx/CVE-2025-6453.json) (`2025-06-23T15:15:32.937`) +- [CVE-2025-6455](CVE-2025/CVE-2025-64xx/CVE-2025-6455.json) (`2025-06-23T15:15:33.073`) +- [CVE-2025-6456](CVE-2025/CVE-2025-64xx/CVE-2025-6456.json) (`2025-06-23T15:15:33.230`) +- [CVE-2025-6457](CVE-2025/CVE-2025-64xx/CVE-2025-6457.json) (`2025-06-23T15:15:33.357`) +- [CVE-2025-6458](CVE-2025/CVE-2025-64xx/CVE-2025-6458.json) (`2025-06-23T15:15:33.497`) +- [CVE-2025-6466](CVE-2025/CVE-2025-64xx/CVE-2025-6466.json) (`2025-06-23T15:15:34.440`) +- [CVE-2025-6467](CVE-2025/CVE-2025-64xx/CVE-2025-6467.json) (`2025-06-23T14:15:27.473`) +- [CVE-2025-6477](CVE-2025/CVE-2025-64xx/CVE-2025-6477.json) (`2025-06-23T14:15:28.330`) +- [CVE-2025-6498](CVE-2025/CVE-2025-64xx/CVE-2025-6498.json) (`2025-06-23T14:15:28.950`) +- [CVE-2025-6499](CVE-2025/CVE-2025-64xx/CVE-2025-6499.json) (`2025-06-23T14:15:29.077`) +- [CVE-2025-6500](CVE-2025/CVE-2025-65xx/CVE-2025-6500.json) (`2025-06-23T14:15:29.207`) +- [CVE-2025-6501](CVE-2025/CVE-2025-65xx/CVE-2025-6501.json) (`2025-06-23T14:15:29.337`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 337726fab35..ce0b067f550 100644 --- a/_state.csv +++ b/_state.csv @@ -138435,7 +138435,7 @@ CVE-2019-2479,0,0,e0c7a602157a3a3233e2924456cab0b3e874e1a14c59e46b40d40a581b865b CVE-2019-2480,0,0,6eea42436df236a96df3c2182dde88be080c2d91d3678fb57a7c2f7ad95e7702,2024-11-21T04:40:57.403000 CVE-2019-2481,0,0,2c7f842fe90c4c9c7c6cf8044eaff1b070218ab2ebd7b7b65afbfc4acbbc5150,2024-11-21T04:40:57.523000 CVE-2019-2482,0,0,60afa5b90bf8c3578bc6106e4f975267fcbb563b3067e9521d1bdccda2a87afd,2024-11-21T04:40:57.660000 -CVE-2019-2483,0,0,b821658a6f7ee7c89026d4480f375545e8c11a566b580a7f59e3cc2db640aa32,2024-12-24T19:15:05.757000 +CVE-2019-2483,0,1,188ec2ef5d16f6941794dea2b1c3928f0252c43dadd311428b3a69b6703d371a,2025-06-23T15:21:09.487000 CVE-2019-2484,0,0,a7715493c3547f6d9e809f816d1813c2921c76b2c7dc1546f30b1b68849ed9de,2024-11-21T04:40:57.780000 CVE-2019-2485,0,0,76d018af106f8af9fdc20711cbfe38a23bc7f9c5c4b44cb18c66175ee6e482c3,2024-11-21T04:40:57.893000 CVE-2019-2486,0,0,4d94fca994706eacfa9aa52f25dc23c95c1e49d831e7a7b89436c2cc7cb6710b,2024-11-21T04:40:58.017000 @@ -181061,7 +181061,7 @@ CVE-2021-38483,0,0,622edd444fd1970690250936215133c33cdade096995312f93fe2adebc7bc CVE-2021-38484,0,0,3ffe4fee6b7501725a199274b616260df7831069e04d2699c5952b4a7355cdf1,2024-11-21T06:17:13.047000 CVE-2021-38485,0,0,f97e910830dacadcf057276e57110b196c3826ff81d7d349713ca4ac6da28739,2024-11-21T06:17:13.210000 CVE-2021-38486,0,0,2ff99207a37afa11179bc42145fb1763a72e77345ccd56d49bbe7290004a4d11,2024-11-21T06:17:13.360000 -CVE-2021-38487,0,1,e9d6d94fc1dc47deaa655aa26abc9d2c6ab6e36c9328dd4a76b76cecbf634fc9,2025-06-23T12:15:21.893000 +CVE-2021-38487,0,0,e9d6d94fc1dc47deaa655aa26abc9d2c6ab6e36c9328dd4a76b76cecbf634fc9,2025-06-23T12:15:21.893000 CVE-2021-38488,0,0,77d2b82d1805b34857247929790f88ea08db23e09054c3fb74498bccedd0981b,2024-11-21T06:17:13.653000 CVE-2021-3849,0,0,65519a47631343065a838e7fb3f76c804b8310fe58e1d2f5c19cd3d40ed22273,2024-11-21T06:22:38.853000 CVE-2021-38490,0,0,9383ba281f191b2cde0ea44335a0ade7b6987564a0140c694c7c9296b46e9e51,2024-11-21T06:17:13.803000 @@ -238131,6 +238131,8 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000 CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000 CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000 +CVE-2023-47297,1,1,bbc46bc58ac1926acbf94fee7d212b14084705214e921a768d0e141589037753,2025-06-23T15:15:25.940000 +CVE-2023-47298,1,1,9592c320400df1379afbda3cccc4c0739e5987b5988942cfee940d4537d295e3,2025-06-23T15:15:26.700000 CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000 CVE-2023-47304,0,0,db46d98bf37576c1ea41928ed0e02027d39d0face4fca78440b8bb53d0e89930,2024-11-21T08:30:07.553000 CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b8777e,2024-11-21T08:30:07.700000 @@ -239413,6 +239415,7 @@ CVE-2023-48966,0,0,c88c2027c13e6fd2aaa41bb08a633ab1482cdd3b1061751f9ee7fc5ae02c4 CVE-2023-48967,0,0,1cd351e34d0367ca1f2c697aa81b0efac29357ca75fe471f5d64e2558fda969d,2024-11-21T08:32:40.463000 CVE-2023-4897,0,0,07a390e0b63403258ae68e36ca13ea1f5f83204b2e2ad36e8736ce5043b6943d,2024-11-21T08:36:12.803000 CVE-2023-48974,0,0,e5c2b099db521bf37d9fbf8a5d47d0a5c7f75b442894bf87ae88502412b1de09,2025-06-17T16:15:24.747000 +CVE-2023-48978,1,1,4f3036d1d6e93e4a5c04bc12686605e2756472c9169b822786ca695526c6e352,2025-06-23T15:15:26.890000 CVE-2023-4898,0,0,f47d5fad93de142b0e520dbe68d4d69341d7e4d308a26e168d2cf20373685375,2024-11-21T08:36:12.940000 CVE-2023-48985,0,0,6085ceaceb9bc984350ad484b7164b84ca1f82a570dc5327d198eae93291cec3,2025-03-19T15:15:45.800000 CVE-2023-48986,0,0,ff6e6738309e970dc01f18950378d453c2d15ac175ea278c464f5c9442a4fb5e,2025-03-20T14:15:16.100000 @@ -251099,7 +251102,7 @@ CVE-2024-21202,0,0,a82724b3e343bc702e27e8d6ce800a916f4b3f0e013f2e090965b5628d482 CVE-2024-21203,0,0,479844f4f758f4b28553f6669f6d21014910b665e890542aa411088e0f38c63f,2025-03-13T14:15:21.097000 CVE-2024-21204,0,0,6e02d97c4802b20054f3c4f36b4262d4579d51c4dad414b899b7f47595986f74,2025-03-13T17:15:27.480000 CVE-2024-21205,0,0,e1826db3e18237be6dde03d7d4cc539b869d1360faa558be8561f743abd88176,2025-03-13T14:15:21.243000 -CVE-2024-21206,0,0,7d6fd60e59ab0e1ece28b89bacd97a84c9e812aa28c26045ff093c2038d4d1a7,2024-10-31T13:35:04.520000 +CVE-2024-21206,0,1,5b3a3f55f1e6e545de7db76a69922b7ae6c94d3fb1466d27fe145646e96fd1ec,2025-06-23T15:20:13.090000 CVE-2024-21207,0,0,8943a78a85322e8f74ca9bb8757d973fc6062abdbe462a9e329a926ce38d871e,2025-03-13T14:15:21.393000 CVE-2024-21208,0,0,96a0dfd3930260cb1ded2610d57bb643c42ac376ae3a0ee18e6cec14bc49e47c,2025-06-18T20:27:14.790000 CVE-2024-21209,0,0,9f9125b2f59e97ee383b40b643ff87dbadc96541830a9dd6f1bb5908b73c9c56,2025-03-13T16:15:15.907000 @@ -252356,7 +252359,7 @@ CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69 CVE-2024-2265,0,0,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000 CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000 CVE-2024-22653,0,0,9327c4eeb2944373f4b4615e203889d4d97ef3692e8a64646c097e9e2e698468,2025-06-18T23:57:03.917000 -CVE-2024-22654,0,0,7f401d524d432dc6daf2737f2dfd50a846877c5557a2b4e454e64bca9bc199f3,2025-05-30T16:31:03.107000 +CVE-2024-22654,0,1,b5f28c7505e5161dc090323e656849833aaca3354ed25a0241d10af1c9ac0770,2025-06-23T14:42:44.127000 CVE-2024-2266,0,0,95d5ae8a3d9367be388b5604e19ba904305ae510fd4151f2cfa0ff7fb43bf84e,2025-03-11T16:53:46.840000 CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000 CVE-2024-22662,0,0,d4858e76cafd8f287aa01b60da8f3daccb222e3defcae1979c4c8e9edd2bdc30,2024-11-21T08:56:33.027000 @@ -266041,7 +266044,7 @@ CVE-2024-4056,0,0,d578d896482bad42a689f24bb727d093d89b4e4ad9a16137115268e371c355 CVE-2024-40560,0,0,5660f8017263b57237c32db3371c0082be9a5828de973f81d34560f70ae95cbe,2025-06-13T00:14:13.620000 CVE-2024-40568,0,0,c12c8f080192deabb173a3181ef7b218c84c4523adbfc6eb7f73c288b6931903,2024-09-20T12:30:17.483000 CVE-2024-4057,0,0,ba7fe553b438d2b224d9d6e5f235b3ee1bb06fdbaf87fbbf24de464c203e2672,2025-05-21T19:10:32.567000 -CVE-2024-40570,0,1,5c264fd0189efaf4a997a0dd66e00078952a2971c0a88ae8c53e80555794db25,2025-06-23T13:59:30.220000 +CVE-2024-40570,0,0,5c264fd0189efaf4a997a0dd66e00078952a2971c0a88ae8c53e80555794db25,2025-06-23T13:59:30.220000 CVE-2024-40575,0,0,8f8f60ae0654b2cb189f518e1a74f4f9151a1448954bee799fbc3bd704a3ffa6,2025-03-18T14:15:39.260000 CVE-2024-40576,0,0,83e082d3228418aa29c19f80e5b0bee7bb26ddf8ff96a67a89128eebaaea471b,2025-05-06T16:42:52.053000 CVE-2024-40579,0,0,da11a1c0f7825d9658796f4408f8973703e2e8887ee02d7fb06e9fa156da18dd,2024-11-15T19:35:07.323000 @@ -267707,7 +267710,7 @@ CVE-2024-42556,0,0,ac1b4152bf99bca20ae35623d62f61452a39fb306fbbee858a0a5374f0e4f CVE-2024-42557,0,0,b692a3b0466194a416876ee66549e1bd8b2c7e51a5c1228110019b0c078e3135,2025-06-05T20:18:43.920000 CVE-2024-42558,0,0,ddd5492e2b52bc68def78917541ff4f0fd5129fe9226419b3f94cbbe242b143c,2025-06-05T20:18:30.253000 CVE-2024-42559,0,0,f7187969dab6ad6558e1754351d11efdd6752164963d45cc6208ae6834946dcc,2024-08-20T19:35:10.850000 -CVE-2024-4256,0,0,d49aec8fe15164ba0c34419bb728cd7f5d55e9099f83229ccad94ae2b4282df1,2024-11-21T09:42:29.233000 +CVE-2024-4256,0,1,56904d042cfcc221e9be33135d7de9b9558ad7f73caf11075c2a329d49e0946a,2025-06-23T15:07:20.147000 CVE-2024-42560,0,0,d8e63dfccffe358d8f5f12e10d5c3bdb3d80b3adec563f71c08b10512ad5a438,2025-06-05T20:18:17.887000 CVE-2024-42561,0,0,d70955b1d40eb54377d8e12e382907c01dc23b672669cb749222161095d7676d,2025-06-05T20:18:01.470000 CVE-2024-42562,0,0,4d5f095c6cbd840b865bd2919364e7e80c3562dd9684dd1b1a5a56be9c16cd36,2025-06-05T20:17:49.820000 @@ -272193,7 +272196,7 @@ CVE-2024-48758,0,0,c09d45b53d733862ccc897703fc7912f82231522c6286fcce4bbe3e958aaf CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000 CVE-2024-48760,0,0,c9b65d5513092443fa283195a16f32efdb1113d6591583c1dbffd494c29d665e,2025-06-06T15:40:58.640000 CVE-2024-48761,0,0,1f5cd512aaf966e4ccb5e27fcd626f0bc8944acedd5c7d09423e312b2b471403,2025-05-23T15:26:18.807000 -CVE-2024-48766,0,0,f87d1b45ba052fd566f8d3ef01b04b86779dc1f99a0f6b2f186b51bb8cd39968,2025-05-13T20:15:25.227000 +CVE-2024-48766,0,1,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000 CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000 CVE-2024-4877,0,0,8ee4a62119f4539bb72579c9037b385657424188b9828b8e94e3040efd347d3a,2025-04-29T19:45:07.223000 @@ -274365,7 +274368,7 @@ CVE-2024-51530,0,0,7cd040cc53d7ba42e6f6d453f4d18993a534b39a2754ee99e99110d754af3 CVE-2024-51532,0,0,2d809e858826663dfe9250848bf54d1d67a303ccaea30e096202fdbcd858496e,2025-01-29T21:06:51.663000 CVE-2024-51534,0,0,119c8ca4d836cf97fc773cbb645e954f693ae364266f1264b856ae256ade04e3,2025-02-07T19:58:25.567000 CVE-2024-51539,0,0,b1af50f63ad59511e4a92be40db02a7d120fd35939f783b0ad1dc1ad8e6b0102,2025-02-25T14:15:31.153000 -CVE-2024-5154,0,0,2b204ac4cfe5700aeb8fd234238f6495b194bb11d4ab3c09549ae293c9be6a35,2024-12-11T04:15:04.990000 +CVE-2024-5154,0,1,9f3086a91e7d0f61e04cc464c2ac0ea5eaf14623ec838410d0539c97fd02a63e,2025-06-23T14:15:26.073000 CVE-2024-51540,0,0,96d82dbba2ebe404a1a2ea6174b3264f3b486447b0ab540d34ad70a82a5fc066,2025-01-21T21:30:52.310000 CVE-2024-51541,0,0,6701a109dfadee0bf9df2ae076263677d2273867a4cd8d4999c49830cdf3286f,2025-02-27T17:18:41.483000 CVE-2024-51542,0,0,51af5b7f493e16046a0353b6dff1f03aa6634aedd1a41c0133f8ad01785b2f85,2025-04-10T19:42:05.967000 @@ -274777,7 +274780,7 @@ CVE-2024-51926,0,0,3af7d3be4c078e7a2de285bfa5deb879d2e999b541df90a9975702e0878d6 CVE-2024-51927,0,0,106ca5e27a288e356fd6a7e911b64c6dfd5b7ba7258e70ff09080ea37925fb43,2024-11-19T21:56:45.533000 CVE-2024-51928,0,0,906f674464392bc223ac1e1b1f01be2b3080856baabf09c25d67edd7c45b67c3,2024-11-19T21:56:45.533000 CVE-2024-51929,0,0,cb4911d106197ddce6c702f19e318e44410a8bbb68de3fb535dfd76509b3dbdb,2024-11-19T21:56:45.533000 -CVE-2024-5193,0,0,f97e68498a247afad5188fc2619ced4b49b6876879074eb9aef251cb87af20f4,2024-11-21T09:47:09.827000 +CVE-2024-5193,0,1,ada3fbebfaa0bf71e803ea79382652bd82216c98f085d92a28d242464f32570c,2025-06-23T15:07:25.363000 CVE-2024-51930,0,0,6a6f30179b2f818a5fbde14015f3085c671c58bd758c9148a860135e38246cda,2024-11-19T21:56:45.533000 CVE-2024-51931,0,0,f1806da64751fc947a9be6b715414a5533bb8bd4b1043efa5b37487df572a9bc,2024-11-19T21:56:45.533000 CVE-2024-51932,0,0,55673a62a416277babc704dc3092cc11640b7d2ab527b4db9563155a69c67e6a,2024-11-19T21:56:45.533000 @@ -276837,7 +276840,7 @@ CVE-2024-54767,0,0,8c4bab4764e9a141ba548ee86cbb68266367c0b9186821635463f547e3a12 CVE-2024-54772,0,0,91a3697268affbf0eb80fdd37decc58bf196ba083d66dc0e72ebb567f63733a6,2025-02-24T16:15:12.213000 CVE-2024-54774,0,0,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000 CVE-2024-54775,0,0,03de079a7c10eead9e4af05c09468a6683068e1ea25d6b843a97d0b7fa560373,2025-04-22T15:46:43.310000 -CVE-2024-54779,0,0,3f78daa64ae1e30267edca9aaf1f5cd7c9429722a06d78dfa35cd6acca9b24e1,2025-05-19T15:15:22.700000 +CVE-2024-54779,0,1,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 CVE-2024-54780,0,0,97aeac9148437d0ba8a5fd67ab0a34cd99c35df10abeb3e7cb7208a15fc9f6c4,2025-06-13T13:03:51.367000 CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000 @@ -278228,7 +278231,7 @@ CVE-2024-57261,0,0,26a9b2d5b7ff5b622e87fcd3863f1f802b79a7b6bbd571d956e44c1603185 CVE-2024-57262,0,0,9fe2f40763eda4120983592ae7a5e38429477dc711d137d5de6a923fed11e57b,2025-02-19T02:15:08.677000 CVE-2024-5727,0,0,fa88f56a97866359bbc0b65df783d5b0244efde0cef8aa399c3e096ccc969a63,2025-05-19T20:47:23.443000 CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 -CVE-2024-57273,0,0,6a2e20d254750aa3649924c48da3ffed2c1304c090bab7fbc8e8a4fea0f6686a,2025-05-19T16:15:26.297000 +CVE-2024-57273,0,1,42528cdfe2635b7b90df075849cf292a0caf64eda2c4e5c47fd4162c44013aec,2025-06-23T14:50:34.313000 CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000 CVE-2024-57277,0,0,bb68fea6cbebd0a104ef91fc94412518559f48ccb229cfa7844f6afcc432f01f,2025-02-05T17:15:21.863000 CVE-2024-57278,0,0,5802b511c82f2f71ef9a786cc45e5ccdffc451e02dca104a266adf57fe298a49,2025-02-07T23:15:14.230000 @@ -278264,7 +278267,7 @@ CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b5 CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b1bb,2025-01-31T16:13:06.540000 CVE-2024-5739,0,0,5872b907e0724eac543322f80b8eb34cf152e3b796dd1fe428ea7d461342a07c,2025-03-29T00:15:24.117000 CVE-2024-57392,0,0,d6a418f92c5b3087ef51bdf4cf98c823bb441b99c1a276be63b31060f929e79d,2025-03-02T22:15:34.597000 -CVE-2024-57394,0,1,7fb50cd067a222b0bc145560bf10473eae60766fd50106ff1ee3b918d74c05cc,2025-06-23T13:08:14.880000 +CVE-2024-57394,0,0,7fb50cd067a222b0bc145560bf10473eae60766fd50106ff1ee3b918d74c05cc,2025-06-23T13:08:14.880000 CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000 CVE-2024-57401,0,0,3e6dff374c710f8b12cb1c7362393b753fe5f2b7a5b106fc3c4641cd281923d4,2025-02-21T18:15:19.040000 CVE-2024-57407,0,0,45e1a10510320897f48f1620e894947df2f73cd6e1f003632125a8e02b442b2e,2025-02-19T21:15:15.393000 @@ -281376,7 +281379,7 @@ CVE-2024-8519,0,0,6d09c03bb5c0676e2db6d7de8b2d6bfb1c8c549009d82d08f9b45ce64c552e CVE-2024-8520,0,0,ee5e313bdd2082e7ac0347f97a4f567f3e181986d8d2c028c9afe06673efefeb,2024-10-08T21:50:30.153000 CVE-2024-8521,0,0,f9b371241b659e5641a68121d0175d4d79935b6aa87350515395e868afaa92d1,2025-06-04T16:56:10.697000 CVE-2024-8522,0,0,3ac21e73fb1c10b4b5ed0e52a198a17bd9ec825a9c6d4ed8383caff4ddd53d99,2024-09-13T16:12:30.497000 -CVE-2024-8523,0,0,046b6b8c63cca6e821040e3f945bf3a4eff3ed7694d20d7a00cf990286a61546,2024-09-09T13:03:38.303000 +CVE-2024-8523,0,1,44421ed02bc08ce2faed0d67ae6d1aba60b9f198d27b1b8b06fe7bf129d33e7a,2025-06-23T15:07:51.127000 CVE-2024-8524,0,0,33b79bd5f5f8b1f6caea1361e2709fb9f6e9ffdb86bbfb1fd17fb49f4b2255d5,2025-04-01T20:31:52.367000 CVE-2024-8525,0,0,e40fe06cb9d6da5dea832197d70784a726c2e86485a80664114babe1f94175e1,2024-11-21T16:15:27.217000 CVE-2024-8526,0,0,87a88335b350126bc897aa9b90f3452321356859016838db3ea06327abc68688,2024-11-21T16:15:27.437000 @@ -283832,7 +283835,7 @@ CVE-2025-1373,0,0,77cfaa3a6771902b072de962115d7552a47b140ae8333a2256741e5279e5fe CVE-2025-1374,0,0,cadb80f4dd4c990bddb9a04d1d5b86061bf8cb9c94d8d0e9a8e4622fd190d028,2025-02-24T12:39:38.450000 CVE-2025-1376,0,0,2b2b61cbe13de588e58e77dbd2d6ba8599c2b392d8f7811bef18ce22646e2214,2025-02-17T05:15:09.807000 CVE-2025-1377,0,0,19be1f82dafea985fb389f6935710bf6fb3889bba10c10bc1ad76bf361c5c361,2025-02-17T05:15:10.090000 -CVE-2025-1378,0,0,7807cf5ff1c93ba334a9efb62df3c07931c343f885f3e8ffd6658ae503279f97,2025-02-17T06:15:13.277000 +CVE-2025-1378,0,1,7b0b1440e8634b58b74747d3b86a48aac3845e3d771526460c32a15ff40576ad,2025-06-23T14:37:28.747000 CVE-2025-1379,0,0,5dcb3165f40d5545ed4ce19a6009cd3b7b7246346d15ef8a292528f915f8199d,2025-04-02T18:44:42.610000 CVE-2025-1380,0,0,6bd04dd2008ea0079e8919e2e53c4972b6e83c3f4c56a4b8715e29739c2e265b,2025-04-02T19:01:09.913000 CVE-2025-1381,0,0,0527ab2734ccec4269c70fb2d0d40ea59b49fa3f3723a4356fee1835e38fef1a,2025-04-11T18:38:03.400000 @@ -284284,7 +284287,7 @@ CVE-2025-1920,0,0,fe1bfe7d3968a4bee0153a90d7c96939434eef45f8e8313d77416606c59a2b CVE-2025-1921,0,0,ba74c018bcf5faf8a06ccf49ccb3d218a4283defa0404c6fedf537f78ae8c0db,2025-04-01T20:42:02.037000 CVE-2025-1922,0,0,ffe3afa46e41291810fea1180110899b162ac00bfd72f4ed17aed7281078e346,2025-04-01T20:41:48.893000 CVE-2025-1923,0,0,6582409071430538ff195b4cf1ccfbfda63320893f755839ae619a5289f82d8c,2025-04-01T20:41:40.067000 -CVE-2025-1925,0,0,204656197890b65c63abfe267c10c63c7646f12dd36af39f4cbd8d6894c1b4d7,2025-03-04T14:15:36.717000 +CVE-2025-1925,0,1,ed33e020c6c799e97809a4da2f8b3e738413c3ef2ebfe4deea0f92aa1a0fd65e,2025-06-23T15:10:37.883000 CVE-2025-1926,0,0,4221b375af30e7037e93f37efe9c0a6378338767f4a8a8f0236af0d6a028f3db,2025-05-26T02:32:26.917000 CVE-2025-1930,0,0,e27d05864f3d9f6ebafc49ef3fedf20597ddb9434fbbf0c2cd1b8fbc38c09f10,2025-04-04T15:16:09.610000 CVE-2025-1931,0,0,af8164fe526ea731987cc7549eea9e98de73d45458537b9e7803f34ece876fe1,2025-04-03T13:29:22.950000 @@ -284494,7 +284497,7 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38 CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000 CVE-2025-20186,0,0,988f7f1d2645d1b97028fb13ba80ac27036d7d2054583bffc040f1b4de466626,2025-05-08T14:39:09.683000 CVE-2025-20187,0,0,49cb1bb2460f1bf94d25f953e4816fb4704910b25f07a14f891f757e44af242f,2025-05-08T14:39:09.683000 -CVE-2025-20188,0,0,c76f1c516e8e4901deea9b39dafb36c1df8db0fd49768c43dfb84a9676fff7af,2025-06-06T17:15:30.170000 +CVE-2025-20188,0,1,80a0c043db9ae0ef650c538fc232514e7650309e09c1117b267293be7fa27255,2025-06-23T15:15:11.117000 CVE-2025-20189,0,0,80748ec81ef3d0bfea0a8fd1c737694e12cc44ced3d0cbf30c347d4a66ab6799,2025-05-08T14:39:09.683000 CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000 CVE-2025-20190,0,0,469a86e281a91f6666aba5167ba034aae7aaa490b577c894f7d420858aa81096,2025-05-08T14:39:09.683000 @@ -285177,7 +285180,7 @@ CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b CVE-2025-21480,0,0,6948132d528c7804139999300020de3a6192ffe9f450494845d5e5c5a7c138cc,2025-06-04T17:24:26.927000 CVE-2025-21485,0,0,03d83e3b9947fa20b8c4220c62d45e20f0436065a3a3d3554a8beeb69e71c0fa,2025-06-04T14:54:33.783000 CVE-2025-21486,0,0,6657ae7f3cc111f37509795b42a9ee2f1a625afcb0e5375a7c1283ba109a4c1b,2025-06-04T14:54:33.783000 -CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 +CVE-2025-21489,0,1,3e868db9a0a2c09e7628e20d55caa1b9b3f67be100045162493f134e3c4ef116,2025-06-23T15:21:28.207000 CVE-2025-2149,0,0,d7df4a69e494fa588a972d8a9b2091768f937c9cdd73a96cb132062cdf0f66aa,2025-03-10T14:15:26.267000 CVE-2025-21490,0,0,b59bfaf73f4a7aac7f498efe2114db1737794c6dd1c56d41aa09f498e00d23bb,2025-04-09T16:06:52.400000 CVE-2025-21491,0,0,4c71536c040f797c835de923bbd00b182f1ac6ab6a1fff2e0c1acd32c2e0881a,2025-04-09T16:07:09.130000 @@ -285195,7 +285198,7 @@ CVE-2025-21502,0,0,e609b91a197717b73d4133c8279c7e31d49feb54f8e96c78fcec879f0eb13 CVE-2025-21503,0,0,c6621e1804e534da4b6f8af2b5c1b59b3c1bcd12c30ae31ad8d5fe188bdf3555,2025-04-09T16:04:21.040000 CVE-2025-21504,0,0,bc881ca1fb7f096c2e016f923823b9a2470f1d2c468ee6287a81011b2db7263e,2025-04-09T16:02:55.010000 CVE-2025-21505,0,0,f82b99d26e4784c08ee442698027f2b08d7f4b7e9565daea0fd24615c17f7a08,2025-04-09T16:03:07.740000 -CVE-2025-21506,0,0,b15a082cfb9b642182fa216ca2dc935119f2b7ff1700f5c5b40e9db4cd530281,2025-01-22T19:15:10.643000 +CVE-2025-21506,0,1,adebf56e0e227afc1f43553e52c0b21e84ee510be6541592b62fc2fe7f7bc436,2025-06-23T15:21:39.560000 CVE-2025-21507,0,0,007166eda0d37ec06452a45526793243e0fea8d62f479e18176e81c46b4337a3,2025-03-17T19:46:46.897000 CVE-2025-21508,0,0,38aa46d6a476bca3579602fdfbd94ba2a9ddd3791de5357a8b647e31a8958f44,2025-03-17T19:47:09.393000 CVE-2025-21509,0,0,78d11a80a54a729b734634d90323f7ce96e2b4cd9da9222a33edddf0250cb60d,2025-03-17T19:47:23.373000 @@ -285206,7 +285209,7 @@ CVE-2025-21512,0,0,b41dd68018c5ee645b589d1dc835b8f1b44209721493f0312f1786c09fc84 CVE-2025-21513,0,0,3c86989aabb2a1abf9d935de5a183eb43828fa543d6b90f0a3a11729ad9dd767,2025-03-17T19:48:23.063000 CVE-2025-21514,0,0,8f6143affc9f22c6886521c601abb0dc1d9ae0e636d6e6c6cd0ae89c6968aca6,2025-03-17T19:48:36.210000 CVE-2025-21515,0,0,0828af27bcb9a16663a74195e55950d31ee556d7231c37d2d3137b27845ad264,2025-03-17T19:48:55.423000 -CVE-2025-21516,0,0,1bff2e6fc2e4a75f5082374868c71f556093e04406da8a3f368eb942875b3c0f,2025-01-22T19:15:10.880000 +CVE-2025-21516,0,1,33ebc4dc0386e8d08244adab75f9c46c30265c9b80e06b800dd67372899c2fd3,2025-06-23T15:22:04.620000 CVE-2025-21517,0,0,1086512bfae7e253f269aad4651607ad2b61c185f2d23e04b49b9b890b2708ec,2025-03-17T19:49:06.110000 CVE-2025-21518,0,0,a3e730d8002ec29d3429831f974c1c6d7cfb47e29e96c89f068326fa8430be91,2025-04-09T16:03:17.900000 CVE-2025-21519,0,0,bd99e2535abab66a9b94434ac3f5b4c912dacdf6748e95a236c4dafd8868bf6e,2025-04-09T16:03:28.280000 @@ -285225,24 +285228,24 @@ CVE-2025-2153,0,0,d1001c611eef70eb71a49d9fe459204d662bb89375cad643af202eb312828d CVE-2025-21530,0,0,b1a49e867472ba70a25f247af19b090d67ec55139a19152ce999713a4e79ac88,2025-05-07T20:05:11.573000 CVE-2025-21531,0,0,5030ca0040f9a6018a6680d6e91134a4e5feb19b3e27dd86ec8b9c39f5a0e810,2025-04-08T20:53:44.180000 CVE-2025-21532,0,0,ff62206288e1ce3e2eb346cc4f07db2099e0d4a0af5b22a41c25d9e7ed7c5c99,2025-03-18T20:15:25.563000 -CVE-2025-21533,0,0,e0d626e9e9f9179bc48a13fd06aabe0dd1672abd415adb6c81ac669d8dab8c17,2025-01-22T19:15:11.927000 +CVE-2025-21533,0,1,ccc0ae1be4f14dabe743caaa8d158db841e2bd795ccdbb12a087598b5bb9f713,2025-06-23T15:22:21.003000 CVE-2025-21534,0,0,f3e3bc44268f89c76af0200cd6217f2c6a3ac2379b1fb591b60edf404fd4115d,2025-04-08T20:53:53.383000 -CVE-2025-21535,0,0,a7f3f871fed6e33a9aaf79b197bf078d043485f7c9d493ffc9a8cebfcd7f4af7,2025-01-22T19:15:12.150000 +CVE-2025-21535,0,1,2e888af15392fb0b9595cc35128d6e3917c29fbaebeeb37721f707b3357f1c50,2025-06-23T15:22:32.057000 CVE-2025-21536,0,0,b28639c212dac5fe3456f26bb9716d382e07a02dd29aec1a2f95f12a92391861,2025-04-08T20:53:58.330000 CVE-2025-21537,0,0,f58f33954af15f700374ba4be972c7b059d34eb3fd460d41885ca0b87c9ecb94,2025-06-20T16:45:43.840000 CVE-2025-21538,0,0,58939685b83171a2f0dbdefd4b15f8bbe50eb2d247ec0557417661152fcf2ef7,2025-03-17T19:49:44.330000 CVE-2025-21539,0,0,8342d82994d74679b4efe1a9e7012563d4b762f0ca4e1d7f1da81ff6370349e2,2025-06-20T16:56:56.333000 CVE-2025-21540,0,0,5c0fc7a5663922f24325b74a7fb831d5b624b90b2a1de956bce68058ecbf8e1e,2025-04-08T20:12:26.263000 -CVE-2025-21541,0,0,ce0f70a063c40730f76f61a376994f3a0b3306f3513e41c95cfed9e59a33f9d1,2025-01-22T19:15:12.827000 +CVE-2025-21541,0,1,185c0488e9eaeb6b52951ef7b7b65f12c76a0d30ac37b055ad79336ba291a8e5,2025-06-23T15:23:31.587000 CVE-2025-21542,0,0,3a52bdb4139f482b37a35bf074f2329800b6e986f65ea89f862e8d92838cda61,2025-06-20T16:57:56.907000 CVE-2025-21543,0,0,1e4da3260b0f2a0de189ddd7aeb40c7f66c75cf9aa4d7a2bd7414442b02ba8a3,2025-04-08T20:13:35.230000 CVE-2025-21544,0,0,8e6235c2828cdd2783c06437e71f4dae7aa335264d892f772c25be6f01aabde7,2025-06-20T16:58:04.887000 CVE-2025-21545,0,0,8e72a18fadb3251721734a26ad9eb23dfd0f940d095f541002bdc57daf18ec8e,2025-05-07T20:04:23.117000 CVE-2025-21546,0,0,b82f3e380622b9a05860422ffd272d7a27cd1f165e5094c53eda87f473ce924a,2025-04-08T20:14:45.287000 -CVE-2025-21547,0,0,5659e9dc8e4681ee7191f4b151d0347009e2c2397580a5555cd29c9f815830b8,2025-03-18T19:15:47.860000 +CVE-2025-21547,0,1,25a10b0b4a18b05878e66ee2bab4bd3d60b8f9ebc2f40021a4607eff19bde8f3,2025-06-23T15:24:44.480000 CVE-2025-21548,0,0,606a21c57ea081be937bfbc67e5b25b8530acf17f17fc0109687613859fc2d3d,2025-06-18T19:24:16.277000 -CVE-2025-21549,0,0,b2a50028e1bcc49830245cddba3f2301a2c50c551db0641ba7ec8ccc88064540,2025-03-13T19:15:51.240000 -CVE-2025-21550,0,0,e5b6aaf4a7d686aaab6f9ee2b427fd22c3f2ad68b4a328f360cd3d2ca4ff7acb,2025-03-13T15:15:51.980000 +CVE-2025-21549,0,1,5382d09d836faef06b93d03399d3ac89a276e72c7a12f28c455743ae66c106a0,2025-06-23T15:24:53.057000 +CVE-2025-21550,0,1,92017aa77ae6c95a423070eda1c8df32559a69c0bcdda4df962784b46c563c81,2025-06-23T15:25:05.683000 CVE-2025-21551,0,0,b673da22cf5f8a5606180b66209828b12e63cef230313032db77a47e1a7f3e59,2025-05-07T20:04:11.897000 CVE-2025-21552,0,0,7ecce434a919c478959a0e1087c69e67e36ea612972e1b51c4e646beee5c29e9,2025-03-13T15:15:52.237000 CVE-2025-21553,0,0,92802bf9739837fa0d2c62514ebaef4b18196a11ad6b61143f1fb0c046ffa5cc,2025-02-04T16:15:41.797000 @@ -285414,6 +285417,7 @@ CVE-2025-21706,0,0,f3378bca6611e287e62df39933cf1d21e33557d4d00ba79e50a89e8e61499 CVE-2025-21707,0,0,b9a0ead8603132ae8c9b4545a9ad4ef804e9617616abc14068f03d0615379a18,2025-03-13T13:15:49.053000 CVE-2025-21708,0,0,180375921d7ace222b11f8ec59581e85e27778345c37b4ab9b4b71ce18a0a587,2025-03-13T13:15:49.207000 CVE-2025-21709,0,0,a14e7b079991c2dff834a4c134806b146fad3426c8ee00bb7e36d413c6c5e076,2025-02-27T02:15:14.560000 +CVE-2025-2171,1,1,f23b527784d8281229ba754f7aa717363b2f886636e19b1f132370bc3f4051e3,2025-06-23T14:15:26.437000 CVE-2025-21710,0,0,7d577fdeeae7df2e8f9e47f3e4aa9e890b8b043c8f557f4e9316ece7be82aa42,2025-02-27T02:15:14.657000 CVE-2025-21711,0,0,e6c14c8d6127b841cd40a6c73bdb0db683cc2793b219532fa0c9bbe5155e4a77,2025-03-13T13:15:49.343000 CVE-2025-21712,0,0,2be8d4a727b7dc56525c5bbe0eccd2de67a0d51ec13edf6e62a85504ec440f98,2025-03-07T18:15:47.507000 @@ -285424,6 +285428,7 @@ CVE-2025-21716,0,0,549d7591deeaa155c202289561e5593a5a85c8ded4d1431847a10528b2e8e CVE-2025-21717,0,0,75c35fa7fba42e24f73abff9b53b1952419e1ddad8d4143bf10c80475ee6ece3,2025-02-27T02:15:15.373000 CVE-2025-21718,0,0,2520ef1afcdc46478f313a5a92354d6fb20effaff260f2b5b7d82b998895b4eb,2025-03-13T13:15:49.760000 CVE-2025-21719,0,0,f615c6b22a70cd4a20e7b0424d01a8a7ad6c045d5c2c11aca0dcb25e7b3a77c2,2025-03-13T13:15:49.913000 +CVE-2025-2172,1,1,cfe0605f5d917c9f00eafe58994390efee3ce4e1d7d40aca3bbaf19f356b2caf,2025-06-23T14:15:26.607000 CVE-2025-21720,0,0,0a0c8dead69b88fdb48e05feff8e64e2e34f9199f277d44d9b715abac576f042,2025-02-27T02:15:15.683000 CVE-2025-21721,0,0,cb718b259efff33aef42e06dc10e923ca6afb1c706aa2b3e33501228c041fbd6,2025-03-13T13:15:50.060000 CVE-2025-21722,0,0,072d53056ce905d076e5c84d30643f7bbfa8ee92227d7718c69ee109f330f3e1,2025-03-24T18:27:47.437000 @@ -286629,7 +286634,7 @@ CVE-2025-23044,0,0,e6c9b2d086f94a8e714cbd413ed76ae334a12cf1a64cc60e47d9247da660c CVE-2025-23045,0,0,1ad1030c132b3e45e8d0c7dfd470fa757b9ecfb67ba9139471ee005cd2d02221,2025-01-28T16:15:40.690000 CVE-2025-23046,0,0,0be4f0c5ceefb1d9073dac1c876d534b112c7cdaae221c8db9bcc89d02a02436,2025-02-28T14:54:50.080000 CVE-2025-23047,0,0,3ee4320b803ce42dd11205db64093bb842ce4a15de110880f0def489c4da811f,2025-01-22T18:15:21.893000 -CVE-2025-23049,1,1,132ff66b5e261613151666ecc9646314c89ec884ad9ae588560d6649d9e0bcfc,2025-06-23T12:15:22.603000 +CVE-2025-23049,0,0,132ff66b5e261613151666ecc9646314c89ec884ad9ae588560d6649d9e0bcfc,2025-06-23T12:15:22.603000 CVE-2025-2305,0,0,b12d70addb583b3ae03712f4ddd6ad2007b7f6b1c1f438dfe3ec32a8453a7d4d,2025-05-16T14:42:18.700000 CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16 CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000 @@ -287047,7 +287052,7 @@ CVE-2025-23566,0,0,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000 CVE-2025-23568,0,0,541d6e4ad43f8dba765299393aac14407144d095e5c8f6fed5ce69f6ad16e1ea,2025-02-14T13:15:44.123000 CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 -CVE-2025-2357,0,0,d1c0cc13a31831861e34b1995d6071a7a4027e859e63779910dafe82d39c0a9c,2025-03-17T02:15:13.583000 +CVE-2025-2357,0,1,3306f690e5868bfd53d607f9011e67bad600c8de0eec40eabfd6792bc7774ed6,2025-06-23T15:11:50.187000 CVE-2025-23570,0,0,c339e33fe57ee43e67044cf27eb7b67a55d9ba70ad791589ea878809139d8a71,2025-03-03T14:15:42.437000 CVE-2025-23571,0,0,3c56bf3d57cf36665f942829237cdd5ae4a799e329add61ae4a156fa2555e187,2025-02-14T13:15:44.330000 CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 @@ -288724,7 +288729,7 @@ CVE-2025-25568,0,0,8bf6eccd897b3aef0c5b736978952194e590be79850ad050dceac1781eef8 CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000 CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 CVE-2025-25579,0,0,9ad1112c1ed3d836da183b36b2d4375f4736b0d6d1110b2bc10e441acd9590d4,2025-04-07T14:23:36.660000 -CVE-2025-2558,0,0,f54caa5596788d78e4aadac9170f01e05efbd611d3891eab20a89c4ada7faf76,2025-04-29T13:52:47.470000 +CVE-2025-2558,0,1,0fecb874eee93db88d1c6609beca7f0ff289247f5b4891178b0b8fecdddabbe8,2025-06-23T15:17:34.443000 CVE-2025-25580,0,0,a7fce7289773d49e23ea5e84e7bf568aff3d97944f32e02e6812a51089903564,2025-06-19T00:18:57.017000 CVE-2025-25582,0,0,fdff5f005418e70695619b15a5365b87844b6870f1b28eb8b42a995086eb8722,2025-04-02T12:27:19.593000 CVE-2025-25585,0,0,98a50572e811d5f13ce801a89eed6933c5c3cc3522affcd97ffbbab7b5092abc,2025-06-19T00:16:52.923000 @@ -289575,7 +289580,7 @@ CVE-2025-27082,0,0,ffb20ffa027c4bd1d4d43e108dc1329f65254792bdc60837334e2fed50c76 CVE-2025-27083,0,0,9973aa4b40c39d6e58e7d53f3b7d373505a0c9f34314a4dc591ed39034ea7e8c,2025-04-09T18:15:44.707000 CVE-2025-27084,0,0,a49dd47a9f3ad17e2e49c3157e24c8752ed90f227d5203cc20e98f8211f13fff,2025-04-09T18:15:44.847000 CVE-2025-27085,0,0,a907717a65908c20d2d3ce3360c3a9477d73ea705f674b740feb47ed06abcb1d,2025-04-09T18:15:44.980000 -CVE-2025-27086,0,1,256f083256c153abe3e013c59563b4f1b7e087bbb7a0322f51ba048b72cf11c7,2025-06-23T13:07:13.993000 +CVE-2025-27086,0,0,256f083256c153abe3e013c59563b4f1b7e087bbb7a0322f51ba048b72cf11c7,2025-06-23T13:07:13.993000 CVE-2025-27087,0,0,8fa44186a191b4cca72dbf2da971e1092d606e1b51d2bd1986f5a06f241d48c0,2025-04-23T14:15:28.173000 CVE-2025-27088,0,0,d9193e5f0462842bd77ae3f49c6f26383f6c8c332cf24e4e4afeb291b16e5504,2025-05-20T16:47:38.910000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 @@ -289948,7 +289953,7 @@ CVE-2025-27525,0,0,a4b246e05aa8e9149e0a9842b4c6807efcd61fab385038ed52473da98c7e4 CVE-2025-27526,0,0,ddc528ca33e807ad7bd5971d3e294beeb24112a05eee8ee501fa1c1a70ff05da,2025-06-03T15:36:56.813000 CVE-2025-27528,0,0,737d925979e07df03f0b19543dbdef55dc6a203923452f1c2a733ea2711ffa92,2025-06-03T15:36:47.120000 CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000 -CVE-2025-27531,0,0,1303d3aeec575967fadd243a1ac347c266301df8b243b9df109aa6520d47fda6,2025-06-10T16:15:36.583000 +CVE-2025-27531,0,1,38b70a8ba5bd87d9d2ad404b393001e5890066ca51a211623411c9449671990a,2025-06-23T14:24:00.320000 CVE-2025-27532,0,0,651aa4a409c4869b141a04074791dba5e586b669772ff0617df8a664fec2b98e,2025-05-02T13:53:40.163000 CVE-2025-27533,0,0,b646a1fe0a6d11554ef785ea8ecefbb2ab2f1a88b51b3c456731090eb57b5f27,2025-05-07T14:13:20.483000 CVE-2025-27534,0,0,e40558e45672ac9b9a33735fa16ef08f02dcb0996c9978ce0ed6bcd8b32d3dcd,2025-04-07T14:17:50.220000 @@ -290295,7 +290300,7 @@ CVE-2025-28097,0,0,6168db1fe1d777fd2d394c22e9d594177390d1d2e476a2272a9ebd5e94287 CVE-2025-28099,0,0,c9c7c1d5f2ef23ae8afe0efdf15d6b98c1d7246b1707b7dade78a5c132cd239e,2025-06-13T15:18:08.250000 CVE-2025-28100,0,0,47615e085b89dc6af9340e37a1268b38c4739fdcdad9b7a5d078e2055be1f054,2025-04-22T17:54:47.210000 CVE-2025-28101,0,0,0f86f2850fd962837a135afcbd92f387d72c4c75bd19f965545a2702eace95f6,2025-04-23T19:03:51.237000 -CVE-2025-28102,0,1,a5f5e87488e1110dfbd32da91ceb955bb6941c337c01f2878fc4d33db94a14eb,2025-06-23T13:09:59.990000 +CVE-2025-28102,0,0,a5f5e87488e1110dfbd32da91ceb955bb6941c337c01f2878fc4d33db94a14eb,2025-06-23T13:09:59.990000 CVE-2025-28103,0,0,2d3902d6f32f3cd48d0521c99a48cd738b4f80255bbd82653914331dc88683c7,2025-05-28T15:49:20.930000 CVE-2025-28104,0,0,208f64a5a282a3b90c32d4a9d095976b1ca6d9b13ccc10644ca73291a8a079d3,2025-05-28T15:49:14.883000 CVE-2025-2811,0,0,147f7c70713501d07077c92b5da21fce6da5227c9479d98b9f09f0ab51afee75,2025-04-29T13:52:10.697000 @@ -290357,7 +290362,7 @@ CVE-2025-28354,0,0,3319dcfee94ea038352a2429d174738ce673ab394ba90ef0551310b223fdb CVE-2025-28355,0,0,10a0bce121dc4dcaed75a554b47f48f4fbbc69a2b38c75cfe79882d09cc25bd5,2025-06-20T16:19:02.220000 CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f127610b,2025-04-07T14:18:15.560000 CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000 -CVE-2025-28367,0,1,0d31c65d4c10840a2ff140a0973e4cfd61104806ec13794cd9a7216f5669ded3,2025-06-23T13:14:02.500000 +CVE-2025-28367,0,0,0d31c65d4c10840a2ff140a0973e4cfd61104806ec13794cd9a7216f5669ded3,2025-06-23T13:14:02.500000 CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000 CVE-2025-28371,0,0,9134c0b29ad829ee44935d8e974e7c73f0d8c01267cd2682d218b45eeaf0a178,2025-06-12T16:26:26.253000 CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000 @@ -290365,7 +290370,7 @@ CVE-2025-28380,0,0,c812077873aafe4be08d39ece96a4d97cd2f4df4a28357fdf5933a2f28611 CVE-2025-28381,0,0,c29a1bab5aea9357924456ab747be9f25188b616f7afcf694fba4f682f8e5550,2025-06-17T19:09:45.910000 CVE-2025-28382,0,0,b0e7ccf5d5a7ced7868f423fbff9e70580d3563f85b9762b991c87477aaa0c67,2025-06-17T19:29:21.273000 CVE-2025-28384,0,0,040afa29fdc376ec47fa008bae4239a0570cc89b0355eff5bcb56a6a3b73be48,2025-06-17T19:31:52.810000 -CVE-2025-28386,0,0,0536dfd3090edb08ca8f2c76cec6a0453215eca97a51422abbda677fa16f4d9f,2025-06-17T19:15:26.943000 +CVE-2025-28386,0,1,5912fa67d9596f8f2697095a3fe341321328dfdc001cf398bf53bee4f44bb6ed,2025-06-23T14:06:04.657000 CVE-2025-28388,0,0,1794bcba8ec3946381f378038b8ba673ba619f4324eae27560582f6f3438e967,2025-06-17T19:41:40.320000 CVE-2025-28389,0,0,ac3d6d4614830ae5beed2b1a1a239f742425bde3a69256016d024e0949604b02,2025-06-17T19:42:06.507000 CVE-2025-2839,0,0,b5f50833ae89a723232ee09a371d928add8cd2f82f45ae4596cf5961719812f4,2025-04-23T14:08:13.383000 @@ -290769,9 +290774,9 @@ CVE-2025-29650,0,0,cb690fb06c7e170a94213a0089eba59b88ea6951964a1db72e6fe406f0c5d CVE-2025-29651,0,0,bffa517747fb1fd066ce6168347e27bf8df7ca0a832f9d9f64bf0567578be439,2025-06-16T22:16:13.750000 CVE-2025-29652,0,0,8d5c668462d815386589b7176986a0f06753f6b9c9cb94261388491c1b545a66,2025-06-16T22:16:22.843000 CVE-2025-29653,0,0,67a65ee0fcb50c85eef841f0e84da2c245401851e7c01a4f02b2fa6f7a74fb5e,2025-06-16T22:16:31.940000 -CVE-2025-29659,0,1,70162a6c96db5db8829e0b1f28fcf8fe81f216a794a2db17b4e781cf9fc1756f,2025-06-23T13:42:41.780000 +CVE-2025-29659,0,0,70162a6c96db5db8829e0b1f28fcf8fe81f216a794a2db17b4e781cf9fc1756f,2025-06-23T13:42:41.780000 CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000 -CVE-2025-29660,0,1,aabf26e814b36f3f40d212389bffaf26e73f160588817159a01fd126502ee973,2025-06-23T13:40:34.040000 +CVE-2025-29660,0,0,aabf26e814b36f3f40d212389bffaf26e73f160588817159a01fd126502ee973,2025-06-23T13:40:34.040000 CVE-2025-29661,0,0,ae2c135a70f6155c281e67b8a5af7487f5fcf748cd55183d73b750a0c0e7ba7f,2025-04-23T18:20:46.903000 CVE-2025-29662,0,0,282a1c6aaef837cc8d68855cb8ea8ea58b4b36fabaa6e48347ab102dbea89844,2025-04-18T16:15:21.970000 CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000 @@ -290877,7 +290882,7 @@ CVE-2025-29837,0,0,74bf66f2834d780cf4440e8ffbc480ce6aeeb858607962d3ca0c82adf238c CVE-2025-29838,0,0,5e08a5bb665c4720f740dfaba3ab525951a9a3ba49e9e62535c426fd81328424,2025-05-19T18:18:13.107000 CVE-2025-29839,0,0,b30be98722fb1868a5c9eb05203e530c559ea43f18d19eb457aa4b39dc945872,2025-05-19T18:30:11.503000 CVE-2025-2984,0,0,6856910f6d465de509adbdfd1a14abe6f1865d640beb12035c173336b2b92522,2025-05-14T16:27:18.417000 -CVE-2025-29840,0,1,eb5a50c2668948b8927a96ff823c2a5a5ee5e3c0e7cb34af87b9ad2ac1b57843,2025-06-23T13:46:22.847000 +CVE-2025-29840,0,0,eb5a50c2668948b8927a96ff823c2a5a5ee5e3c0e7cb34af87b9ad2ac1b57843,2025-06-23T13:46:22.847000 CVE-2025-29841,0,0,770d6c2c0e5ee243b5d0bc0d8ce799f865ffa860220358b711b0469c7a031be0,2025-05-19T18:29:53.210000 CVE-2025-29842,0,0,a3ed5cb1a08c2b7405fc30cf7fc5bbe0916589e57b977550bb7b3fa8538c4f3c,2025-05-19T18:29:35.220000 CVE-2025-2985,0,0,0776e8bcf19d541e11517567c0d73f7924ca1745683645c0b82317c6340ec04d,2025-05-14T16:27:11.127000 @@ -290954,7 +290959,7 @@ CVE-2025-29972,0,0,c90b16171d0bd8d0cde527ee2d9407ab8ccd2b25d976222f75436059ebcbd CVE-2025-29973,0,0,5888490323bcae2fb2b7d83e9fb5785e53c4b68371b3cc9d51d36070ca813521,2025-05-19T14:20:34.373000 CVE-2025-29974,0,0,bc21fec701f9dea06d6d888e5cc5f09a1c6373240fe86fdc8ef6d4f4e28eaa1c,2025-05-19T14:20:27.007000 CVE-2025-29975,0,0,985bd5a0ba0962a486bc661c421475235076d185f1124ab657822ec561a165f1,2025-05-19T14:20:14.583000 -CVE-2025-29976,0,1,9f72bec31791f4349a5fc1035afdd9bdb9c64e15a89579d6a0d30f2731ab2a5c,2025-06-23T13:50:36.603000 +CVE-2025-29976,0,0,9f72bec31791f4349a5fc1035afdd9bdb9c64e15a89579d6a0d30f2731ab2a5c,2025-06-23T13:50:36.603000 CVE-2025-29977,0,0,aacc6c749c396693cab93b541fec8b5f2a858ca8de9cfcb53230e53ed49e5fd9,2025-05-19T14:24:38.660000 CVE-2025-29978,0,0,fe15d592474da4d3d58f58bb4ec49e76716bb56fb22499b477578e1031fdad09,2025-05-19T14:19:28.423000 CVE-2025-29979,0,0,94fe3d254b7642c8b5006805bfa8e4f49219f578ff058d8e61c6f5814723d5be,2025-05-19T14:24:30.150000 @@ -293397,7 +293402,7 @@ CVE-2025-32870,0,0,9dfaf4968559e46a3335f01151ff3a08e8a477d9c61bda01559d6ee35cfa4 CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b85e3,2025-04-17T20:21:48.243000 CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000 CVE-2025-32873,0,0,f7d763f6cf9dd2dd2fc4fd446f09dcd8aecf88b16e7b9cbc3c04e6b52caefba3,2025-06-17T19:44:20.957000 -CVE-2025-32875,0,0,f661a2665def70b520fc1c6c44337f46755fbf05a6fe74b1d74c38b535e52309,2025-06-20T15:15:19.713000 +CVE-2025-32875,0,1,1ecf4ecb9c8c9299160a8dec13b31f1e344f77f02ee93af1c8f61f5fcd4dd794,2025-06-23T15:15:27.400000 CVE-2025-32876,0,0,b359294b619c26c8351a299d7818957dd391eeaf6565d3672638043e8443c0e5,2025-06-20T14:15:27.877000 CVE-2025-32877,0,0,dd219aeeb9989d4c29173d23498e70d0a6a03ae3090a8b9918df11e455e331f0,2025-06-20T14:15:28.250000 CVE-2025-32878,0,0,3879fa1faf01e446cb6e900199955a950befa6933404b3f997c1c9e54a599695,2025-06-20T15:15:20.257000 @@ -294421,7 +294426,7 @@ CVE-2025-3836,0,0,27b31cb245b39058d613eba95c66e9f4b2d85b77b3a4d45de05d79e402b914 CVE-2025-3837,0,0,5a47b33afdb7e1907c95a70c26ce3ac05141d02d9782062528ed4ee5ab63acd5,2025-04-21T14:23:45.950000 CVE-2025-3838,0,0,bb793984df5f3344ae8c93ea895951dc09f41cafe84f678ece4d6f95f3b2b330,2025-04-21T14:23:45.950000 CVE-2025-3840,0,0,b1f4545e120a252367b3125fdfdd7687d6b9f87132cbc1437fe555ba2cc803d2,2025-04-21T14:23:45.950000 -CVE-2025-3841,0,1,d2decfdf95bb03faf08afda0adf107614c87e870e1130c5067607ba573426f6c,2025-06-23T13:06:18.607000 +CVE-2025-3841,0,0,d2decfdf95bb03faf08afda0adf107614c87e870e1130c5067607ba573426f6c,2025-06-23T13:06:18.607000 CVE-2025-3842,0,0,fa01dbc10feb7e69ff4c0a1f020493ea506814102d1e957f7b37a73f3a343a18,2025-04-23T14:08:13.383000 CVE-2025-3843,0,0,ac16c481ef75aa911bc90570d6bd455693851332bc177c9b95509ebaf0c5e1a2,2025-04-23T14:08:13.383000 CVE-2025-3844,0,0,8c2025d15a8350f7f36c52539c2d42c5faaac973ed0f0a2899883e6a8c3da102,2025-05-07T14:13:20.483000 @@ -294853,7 +294858,7 @@ CVE-2025-4037,0,0,c2a9a7365cb7350487e335b4185abf1b7136e28443b7d38831abbd5f1a9ddf CVE-2025-4038,0,0,811046a13e982bc58a873e9f3dcdd8f0924b9962b393b0dcd42ae969573255a9,2025-05-10T00:54:58.380000 CVE-2025-4039,0,0,82997abe4f3d1a06f2c0c0c7affe39718ef0820c54c5fc54b87a7722e7f87a51,2025-04-29T21:08:47.950000 CVE-2025-4041,0,0,81f238f672f184f46ddf27c78435ddee43bf5343b5983877b97d104b8691f898,2025-05-07T14:13:20.483000 -CVE-2025-4043,0,0,c5f411ffc1c0bfefdd17b991af2ebe0c8e5cb9dbd004f8186edb3edb010429e3,2025-05-08T16:15:28.283000 +CVE-2025-4043,0,1,96e5d1ee8417eb83850d485f2ac507c3e7a120681669505409fb2466342ff662,2025-06-23T15:02:15.940000 CVE-2025-4047,0,0,697dde15b783c10558b99d9c3867d89fa2dd1910aca7332b9ebaf25195362a97,2025-06-04T14:54:33.783000 CVE-2025-4050,0,0,ccfe15f2834569ec41cc4a482172c37e9ee278c6a1d3b20eba7b56bd00075454,2025-05-28T20:08:51.557000 CVE-2025-4051,0,0,ff804ba52545392d7d95b067994000fe8637ebe480f1a272e743d510a5634584,2025-05-28T20:08:14.553000 @@ -295031,7 +295036,7 @@ CVE-2025-4131,0,0,e145db9bdcf5e54a3788ea8919212b2cfcdb96e29e639a2a6fca852d8fbe36 CVE-2025-4132,0,0,e4809de586f057a9e14a37c05676b7015f221bfc82c94512bf23f0611070b256,2025-05-12T09:15:16.080000 CVE-2025-4133,0,0,62707a46d404303184816916a5f626e6709dc33fc51eeac3cd7609c2da4dc930,2025-06-09T20:13:53.007000 CVE-2025-4134,0,0,fe02b000815c2b18022230e610523ae527b21156d0dce332dccab36a3788f863,2025-05-28T15:01:30.720000 -CVE-2025-4135,0,0,01c9516738f2c7e6a2803af95172e0ffb0a84985f86dd8ffec63a9eb3a08b905,2025-05-02T13:53:40.163000 +CVE-2025-4135,0,1,c9ff5c59ba5a97583f7b69e4b2ed2e557c817f63927999bfb3854e6ee5f62bd3,2025-06-23T15:13:00.287000 CVE-2025-4136,0,0,b8475b2b882f1f1345ee88b0d17b9c4d6134110c252d26b338548acd634728a6,2025-05-02T13:53:40.163000 CVE-2025-41360,0,0,0c58d2152e0e379d53112ddcbb05190aaed26ee5677fca051411e5049c547888,2025-06-06T14:06:58.193000 CVE-2025-41361,0,0,bd83711ed5d2ea941a053d38aae602c59aadd1434b92514650a1e422cecff8e3,2025-06-06T14:06:58.193000 @@ -295048,7 +295053,7 @@ CVE-2025-4138,0,0,e24a1df01d5dbf416d0772fbc42743a05ce6be9e23d5dee2edf9f865e78913 CVE-2025-41380,0,0,6a50932054dc502ee7c0d77cfea4430344ce4717310545d50ac9fc3a7b76dc81,2025-05-23T15:54:42.643000 CVE-2025-41385,0,0,37545ea39efd4d7b5e0d6cb5131cca3e61d7d577b10fafacb6827a6e97f74309,2025-06-04T19:58:38.140000 CVE-2025-41388,0,0,cea4fd6e5baa020179de0c3ab4a93002a86c5b4be86c160109165aee67a76dd3,2025-06-18T13:47:10.020000 -CVE-2025-4139,0,0,3538d63522b35511b115b5e01479d5d2b1b8eb1cf239e75d2540d09e84fdaed1,2025-05-02T13:53:40.163000 +CVE-2025-4139,0,1,1495c73b6647ed5780d6e1ad25afe1ee98c197ea2b5ab75677590ec2918b1247,2025-06-23T15:13:27.283000 CVE-2025-41393,0,0,530f65a313720270b05a5e04ea761ed2dfbc169adb957fa6f54beb0e36c6dbe7,2025-05-12T17:32:32.760000 CVE-2025-41395,0,0,65b9e3526569f587eb1cd97410ac7325e217f46717fe2bbf0abfe0a9511ead3c,2025-04-29T13:52:47.470000 CVE-2025-41399,0,0,7a1373417457a02ea13a0bd88541383fb57eb0536c4c4f5c68760eae861e0e0e,2025-05-08T14:39:09.683000 @@ -295653,8 +295658,8 @@ CVE-2025-4498,0,0,fe4e54354871751f165270510115e7eb077cabbe51e36c7351729c7c48e0bb CVE-2025-4499,0,0,1c02b1692a3925b37458edec07dd6f80534dbff3f2fbf04106606bb95639a5b2,2025-05-28T19:24:12.107000 CVE-2025-44998,0,0,f1cb20085e6ad15afab179cb443903adcddb0c447c4e2857ef8052b5a5ee7d7a,2025-05-28T14:58:52.920000 CVE-2025-4500,0,0,b252739c7e43e1ed91691824353b7e97e2316b3cdd7ea7ee228d50eda984af82,2025-05-16T14:16:47.373000 -CVE-2025-45001,0,0,c2eb6707981a292a6cdaeb7b4db6c9e17db05c0dd474ee7c1a9ba0207d2fe8c3,2025-06-12T16:06:47.857000 -CVE-2025-45002,0,0,a7efee75fa7578dcd678f3543aaebc4295b4b667e1a1da9a7035b514b4322343,2025-06-12T16:06:47.857000 +CVE-2025-45001,0,1,5f4f05269038efb99ff482c55824e423af834b14d21d110122e4124de52aafd2,2025-06-23T14:18:43.410000 +CVE-2025-45002,0,1,4062797d30f697271410ee1f345875504aece31b398023f8c0ae9a198b60b968,2025-06-23T14:15:58.093000 CVE-2025-45007,0,0,5a942b67af458dcbffcc204143a4774311c59d5ad4885c5c55fb7d9c1ebbeebe,2025-05-09T13:45:28.627000 CVE-2025-45009,0,0,36c5cbb0f37a55a2bcef11b942052fc47923af5c699055a488196b4ed54c3a22,2025-05-09T13:45:16.187000 CVE-2025-4501,0,0,2714d56986429b577c90c5115348855d531ee85270c1ad90311b312266b13026,2025-05-28T19:25:52.347000 @@ -295814,7 +295819,7 @@ CVE-2025-45846,0,0,51d693d14f22c6c735df1fa76b25052e8a11d20981dbbc646066d2d29016b CVE-2025-45847,0,0,4ed18ef753848179b985042a19837700c8f0cb1a81c7d5ce45292d9f94eadadb,2025-06-02T17:27:39.587000 CVE-2025-4585,0,0,de0ef46eb68a7bfcdbe12487f0dad42760c4b1425908d33a0156dee60d09c3e8,2025-06-16T12:32:18.840000 CVE-2025-45854,0,0,8da6ea0519a831e65c7cd6df3945ca62dff794f0b2efeba768b2f0909531788a,2025-06-09T15:14:23.153000 -CVE-2025-45855,0,0,93e6e50c29da0330b6825dbc4712cfa68cc989f69981bc9eb7685e5938173fae,2025-06-04T14:54:33.783000 +CVE-2025-45855,0,1,f83acc46039ebb0726b90a3363a04a3275d7490e0c2ce1bd0670de0c97f6346c,2025-06-23T14:25:39.560000 CVE-2025-45857,0,0,dcf851c628b00f7cbf7f9997f2bbb8d1869ef466c2968b3bd76ff4947bdcf23b,2025-05-14T14:15:29.737000 CVE-2025-45858,0,0,a000c9c9a64c590fb591b967028ca45d12f9b4512bdd2b8ce0395e50725e9c2d,2025-05-23T18:57:36.203000 CVE-2025-45859,0,0,f04cb01d4c73926dbf1b974b33e3c12f183dcea4c8d1314caf69fec8d88d36b8,2025-06-16T18:25:52.807000 @@ -295864,8 +295869,9 @@ CVE-2025-46060,0,0,2da92ad7624a864b48c567a8180993e9f22aabb3ca09b58c16a9f521dba58 CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000 CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6776,2025-06-04T19:59:09.353000 CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000 -CVE-2025-46096,0,0,f8a56185e328468f82d9a858e3d92bbc3a0958e55db06a59a46899fc2f5229fb,2025-06-16T12:32:18.840000 +CVE-2025-46096,0,1,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 +CVE-2025-46101,1,1,3ed9f973817c1345c2cb40bfea3c49153c9652185515117023d05d2c6e6b815d,2025-06-23T15:15:27.793000 CVE-2025-46109,0,0,bb1109471e63f9f01bda5a8e1fe3323745e7e35c57fe91f6f8526660daab841f,2025-06-18T16:15:27.607000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 CVE-2025-4613,0,0,f577ead831948daefe1272603bfaf0609f1e849af3f425f017bfac9ead135854,2025-06-12T16:06:20.180000 @@ -296211,7 +296217,7 @@ CVE-2025-46718,0,0,885c34e4ac34f705a4ef1825ec33431373f2ba5032bb9657c9e7312381094 CVE-2025-46719,0,0,b25887997950d7d3ab39998b5b94bb3c024854b8ada00a78d9ecb1ca2e7fd509,2025-06-17T20:18:16.003000 CVE-2025-4672,0,0,770c887d10dfc09d1e63fabe3c5364c54cf353a1948a47be8491ff905549003b,2025-06-02T17:32:17.397000 CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24e34,2025-05-05T20:54:19.760000 -CVE-2025-46721,0,0,5e50b3dbcf6470803d075fa512b6ebc1828bcf6f2f10959b66c310bc472274ee,2025-05-13T20:15:30.217000 +CVE-2025-46721,0,1,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000 CVE-2025-46722,0,0,cf46ef2e6249b8935c48334672e28d50cf3343c6c1aff5e7300e5238080dc235,2025-05-30T16:31:03.107000 CVE-2025-46723,0,0,23909492a9ee443fd9ae3060d2ebc8db94328dcc9cf17248e4a0a9a7d6a6e953,2025-05-05T20:54:19.760000 CVE-2025-46724,0,0,e9c56e50a6ab4789521e42f1b57dca0731674d1f66af8a8445523cd7498bdd5d,2025-06-17T14:11:48.377000 @@ -296590,7 +296596,7 @@ CVE-2025-47256,0,0,c5f61341ce1b30960f41faf1ef0c8059c16b1b83f0508df1bf27b84fa8e3d CVE-2025-4726,0,0,984a3badb3ae6972f992c3a68c560c7dfd9d5fe06debdb311c424144763624af,2025-05-27T19:51:34.753000 CVE-2025-47268,0,0,4a46b9885e97102b8415ee3e4814f6839dc4a606dc76c0dedcf7a1f41c27c030,2025-06-13T18:21:42.427000 CVE-2025-47269,0,0,b9d52d64e2c0cec1ecdcd2f4d7408887dda629b4e369e1e7b2409608db43df35,2025-05-12T17:32:32.760000 -CVE-2025-4727,0,0,fba2caa5bd9e0e094313a7f7f527bbece7ac112c01ca78f6363fdd9a073dfc74,2025-05-16T14:42:18.700000 +CVE-2025-4727,0,1,8969a844acb51d1753bc87877879fed95de1d0baf44d432214b9cd44fd598ac5,2025-06-23T15:14:50.350000 CVE-2025-47270,0,0,f7de4b1bbad67df8d0ed8562ed81ad54a4a617d8e905a95b0012c5c493a9cba4,2025-05-12T17:32:32.760000 CVE-2025-47271,0,0,b4dba60dfb0342c7663df3f21e36f0d1e4cac1426ea6dff373e34c92771a1236,2025-05-12T17:32:32.760000 CVE-2025-47272,0,0,1bb2a09d129fd4f2d7c6b93b95b1a828935f3db642060df71fcd1da62c721565,2025-06-02T17:32:17.397000 @@ -297028,7 +297034,7 @@ CVE-2025-4790,0,0,1cde53f18939fd245b2e017ab5d61b1aabe2517bc390d40b0830feb8eba632 CVE-2025-47905,0,0,0badab8f2933a29538d7ef66ea7b6761136968565fc3d324c0e27cff6bcc6258,2025-05-29T09:15:26.587000 CVE-2025-4791,0,0,28f506e7fa1c70a3ee261c046fff0149e1890f11d112b4d14f3ee7199740eeee,2025-05-23T13:19:04.810000 CVE-2025-47916,0,0,7254b14db3d84a4fae2a957ff5aae1d18dda4aa5d6c7fa7b707e42e9728ce8d3,2025-06-20T17:42:15.083000 -CVE-2025-4792,0,0,e93bfb8afc74fa0443c02ee4ac7a2e629717c3d14792e2e8ebe336ffc6f037eb,2025-05-19T13:35:20.460000 +CVE-2025-4792,0,1,f4aa37a652381fa243274795ed37a191f51b49c8040e00fb5b01e1520c8c5161,2025-06-23T14:51:36.113000 CVE-2025-47928,0,0,c98d79f9403b054eccd93f148fcf481d13089a9bec154b271a0eadcf13b86566,2025-05-16T14:42:18.700000 CVE-2025-47929,0,0,7fc15c7af26adf36cdf89018fb748ea0cea6a0ed56d6cabffa736dce44604a5c,2025-05-16T14:42:18.700000 CVE-2025-4793,0,0,ec69064861ba117d418880947f64b864bae8e19e90fef5ea47c2be77c9ecb787,2025-05-21T21:00:12.357000 @@ -297358,8 +297364,9 @@ CVE-2025-4869,0,0,870b6fb7f96763d1ac0b1ff6f50594749d4dd6426d23a4566486d6e216908d CVE-2025-48695,0,0,39b88432a15a3b8e91feb94d32e426fa969d9198b6e75ff2ba9bd798bc547242,2025-05-23T15:54:42.643000 CVE-2025-48699,0,0,44d8862507c41a93f498ba4b6a9317982afecdc3e0eb3976f21c5759c7dadf21,2025-06-12T20:15:21.583000 CVE-2025-4870,0,0,b9975f7dc89af7cfd09d0fdbb811b050a9e4120a956157701f81e28626493a8c,2025-05-21T19:40:16.293000 +CVE-2025-48700,1,1,cee7f1f9d16618ddf8f0ee40193c7dc9b1ca05cb84b07493960a078ada86c35c,2025-06-23T15:15:27.930000 CVE-2025-48701,0,0,35aa8b81bef67a8b475084f139411c80773326ef7d953cb76c543e9e2bb840a9,2025-05-23T15:54:42.643000 -CVE-2025-48705,0,0,c46eaa5fa2a143a45a513357d6d2e06bced6b1e6fe96e50349fe2b98b4215ef5,2025-06-20T14:15:29.633000 +CVE-2025-48705,0,1,5fbe304565cc6dded9dff7ec2e63dfc17afbc5aeefe04a66fc4003d534d40ed2,2025-06-23T15:15:28.067000 CVE-2025-48706,0,0,b6396ca4f8f26244025ac40c88dabb3a26eff089e363c92cb8bcd03b388139a9,2025-06-20T14:15:29.750000 CVE-2025-48708,0,0,2f2ee7f6835a24101b8f2fad92720fa7e2d2cfee9343296271ef3f76df75e315,2025-06-20T17:13:54.913000 CVE-2025-4871,0,0,d9183a6ea5a2afa28642be53d20b661c6aa8059e9e6e695046b3eafadb08ebe3,2025-06-12T16:27:46.547000 @@ -297379,7 +297386,7 @@ CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8 CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000 CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000 CVE-2025-48747,0,0,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000 -CVE-2025-48748,0,0,b7307577dff3e5ce645bd5ba057a9ae096f6a95ae5b6b2f453f6bbe07920f1f1,2025-05-30T16:31:03.107000 +CVE-2025-48748,0,1,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000 CVE-2025-48749,0,0,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000 CVE-2025-4875,0,0,130bc5da676a7028541a0b0fca1ba41a63baeb979bb88a491f60fd8b45c2548f,2025-05-21T19:39:23.917000 CVE-2025-48751,0,0,7b48afa401b2b93b58deb3a57cdb6356d07d3afa8b095b572a5b480362f21209,2025-05-28T14:58:52.920000 @@ -297551,7 +297558,7 @@ CVE-2025-49075,0,0,54be58c89d858cfc2a2a38282ca430d2d44e5da7afee9b9ba3a3af9890aab CVE-2025-49076,0,0,11ca67faa747268bd3e42ef94a795b585577483e7914ce9d6c222e8b9284807a,2025-06-06T14:06:58.193000 CVE-2025-49077,0,0,ea2e636f032c4f39bdc78ff636e21026e853dcff77025a2be8dc5f87ad787347,2025-06-06T14:06:58.193000 CVE-2025-4908,0,0,de60be5e9644ec87fb1afc243f75b0e5b1a22cdd347bf91d496fa5782bf1af05,2025-05-21T17:25:58.063000 -CVE-2025-49080,0,0,24473e6cdad70546affe7b5b2d7ae67553c5fee04a8c2ff4994f43bde77dac47,2025-06-17T19:15:32.847000 +CVE-2025-49080,0,1,a3ee145d7be4cf83dc9f312b5f9ff46e81d31b0fafa34aa01f5f4b5126f1b5b8,2025-06-23T14:09:31.560000 CVE-2025-49081,0,0,f46741ebf083f87723e4189da0a46cfa0dc212582189b9cc78f69348a5e0933b,2025-06-17T20:32:38.453000 CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d9b,2025-05-28T13:08:14.173000 CVE-2025-49091,0,0,6801a10a59e1cc04be6899d10437a31277f24115003af5306a3ab76dcd2ff20b,2025-06-18T01:15:28.803000 @@ -298017,10 +298024,10 @@ CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000 CVE-2025-5034,0,0,a5237986d670eb1fe5b75c607eb4c19a8e149970963980b2e7a9c1ea2e29eb2a,2025-06-21T06:15:18.363000 CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000 -CVE-2025-5049,0,0,53dbae82bdedc08260f20ca332c247f8512f5fc62c5e6ab84cf9d9483000bcbc,2025-05-21T20:24:58.133000 -CVE-2025-5050,0,0,0231a3b3f178e79df4e21eb66d9feaab9381ab362e00abce6f5ea784e566916f,2025-05-21T20:24:58.133000 -CVE-2025-5051,0,0,633ab9f0965a04ced0130be643385d8fded21b1286c431b6dbb64fcf6b904f21,2025-05-21T20:24:58.133000 -CVE-2025-5052,0,0,8cd027c6a76d1e4820f1b494080343eaff4cc92275034a206106c3dd92be55c5,2025-05-23T15:55:02.040000 +CVE-2025-5049,0,1,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000 +CVE-2025-5050,0,1,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000 +CVE-2025-5051,0,1,5142d535b5dcabf799858265cb0a073c54ecb398a0506990f7cead12fe67b40e,2025-06-23T14:51:29.537000 +CVE-2025-5052,0,1,fb14f53f59872f2ab4cd272c068cbf989da6288adaf09d4f876ce8e48ca81915,2025-06-23T14:51:27.970000 CVE-2025-5053,0,0,3d2b70b4aa9309898ac88338d0e45e48032f9ef01b4619e69e4f80270305e3ac,2025-06-10T19:34:33.830000 CVE-2025-5054,0,0,68d095110a6b2be331697a8699cb10ea98d7a65a96add11ba5059f95d872a268,2025-06-02T17:32:17.397000 CVE-2025-5055,0,0,2813a40f904a4d38c72314bdeb0478f12eb76957b4f05117bb45d588d4e24d35,2025-05-28T14:58:52.920000 @@ -298038,8 +298045,8 @@ CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee CVE-2025-5071,0,0,3b2deef9236f3c759cda3ca3d7c218b19b13648226fc3eecf9f17094b26eaf9e,2025-06-19T10:15:22.027000 CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000 CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000 -CVE-2025-5075,0,0,e2d063c837a04b124fb91d6969390128004202435ff9c54fbec941e95c405ada,2025-05-23T15:55:02.040000 -CVE-2025-5076,0,0,c2ff5d271ab702dd0a12a7b1169a49084e2bb53fd3955ea59a9fdae042829f3f,2025-05-23T15:55:02.040000 +CVE-2025-5075,0,1,84d47ffcc3b0444179dda95ea7f7a9076e7c3fde7adbf4a674f65dac66b933d7,2025-06-23T14:51:26.367000 +CVE-2025-5076,0,1,dfb109cca293f4ecfde310307b8461b290498890aab42474abfa1c401ad76c9b,2025-06-23T14:51:24.623000 CVE-2025-5077,0,0,5bb361381f7737ab78bfa864953c20bd9e7bf1942fef8fedd416b02808d591ef,2025-05-28T01:53:25.660000 CVE-2025-5078,0,0,57059c330cb53e9cb302cf773988b3ce2f731665e7a246772389547bf3f9a34e,2025-05-28T01:52:35.277000 CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5cf,2025-05-28T01:50:48.303000 @@ -298058,8 +298065,8 @@ CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68 CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000 CVE-2025-5108,0,0,78dbeee09f012ae2aaa551a95acb36d04547bdfe4234231d8b8da6c18969eef6,2025-05-27T15:15:35.727000 CVE-2025-5109,0,0,af8f6823c329a88d09917c36f339b1374b9b939e3d9208c4a4573c3155524a8d,2025-06-20T16:02:35.837000 -CVE-2025-5110,0,0,e7670a8a50f08be82a13bc40fc708deeb067ce33f3b398a7cb0707300883ce50,2025-05-23T15:54:42.643000 -CVE-2025-5111,0,0,4f2efe017f4d6f156e75f3e476d7aabec389dc7ca44749cff7f2d9dcb92adedc,2025-05-23T15:54:42.643000 +CVE-2025-5110,0,1,afef19488b9b1daf7bad30423efa6db081313c1d760a7b2a90aa6560948b5674,2025-06-23T14:51:22.817000 +CVE-2025-5111,0,1,17bae438284397cfc73752a9b416f2ba9d466f2efbb72d3931bb65bdff917541,2025-06-23T14:51:20.580000 CVE-2025-5112,0,0,14e5700c63f1f1d448cfb10a35f8ed4225ebfe296cafec9014826190b78b6763,2025-05-23T15:54:42.643000 CVE-2025-5113,0,0,4fded5fd40401c221cac2ef8ce80b61992e5d3143855e1468dca36f7819a9933,2025-06-02T17:32:17.397000 CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000 @@ -298205,6 +298212,7 @@ CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000 CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000 CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000 +CVE-2025-52542,1,1,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bdd74,2025-06-23T14:15:26.753000 CVE-2025-5255,0,0,0d9f56d5e1509a662651a50a1959d77ed1c049a1471df3ec7483fe3801248464,2025-06-20T10:15:21.653000 CVE-2025-52552,0,0,27741305ae00f3d36bb92eb33f15f4f7f40418a880f409aa430ffa00fa775060,2025-06-21T03:15:24.990000 CVE-2025-52556,0,0,839776e8ea5d48efbfe10dd749a9ae7819c361ef6cbb9befd317045b49103746,2025-06-21T02:15:19.947000 @@ -298260,6 +298268,11 @@ CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3 CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000 CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000 CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000 +CVE-2025-52875,1,1,de754e4497180a907f0d433e64adca9030b7017b82b3587162d59f6bf510c0b8,2025-06-23T15:15:28.260000 +CVE-2025-52876,1,1,df0bcba60153504feaa86afc0059e8a8994fd547fbef45903954ca07a542bbc8,2025-06-23T15:15:28.447000 +CVE-2025-52877,1,1,b2da309d35100995e03c52bab09ada2e66fade963cff04b95af0c33c599be141,2025-06-23T15:15:28.603000 +CVE-2025-52878,1,1,a631817ec18b37959b9580e1c3089005937ed70e4127c5016da10b9e930f9076,2025-06-23T15:15:28.770000 +CVE-2025-52879,1,1,9d4f83893a3c9f1de395e9905a463896db5eb3d4bdaa2a661fcb2a12bdf97553,2025-06-23T15:15:28.933000 CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000 CVE-2025-5289,0,0,b9d742cd07348cf5ac5a6bc32677ea7f81a3f79e8dc609eede8959a563a09a42,2025-06-21T11:15:35.240000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 @@ -298269,17 +298282,19 @@ CVE-2025-52917,0,0,396ebcf3862c8b1d83dc39956ba0b507adf7c9407b69770734a7210892a83 CVE-2025-52918,0,0,c6d463ed30e89c378c382dd97387682ec22ee25050cb7e01cbda9359dd2988fb,2025-06-22T00:15:24.920000 CVE-2025-52919,0,0,6f74c19e10831d38a32e3f82b2d49209b35b6b6bdd6b9ca3f6db762bf063ee01,2025-06-22T00:15:25.073000 CVE-2025-5292,0,0,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b48,2025-06-02T17:32:17.397000 -CVE-2025-52920,1,1,49b2f215e41da7d80f5ec01d9e27f83f97a2e8d49b968c276d4e1a5d7aec1a1e,2025-06-23T12:15:22.803000 -CVE-2025-52921,1,1,da07986331b1b7cbed22dedcf9611ed2cfb0437eb3e0985e9ca33a204e0945b9,2025-06-23T12:15:22.970000 -CVE-2025-52922,1,1,f04adc2ccfbd757236018ffd479495a4317760651879c263d6cbb1f1eba9ecd8,2025-06-23T12:15:23.150000 +CVE-2025-52920,0,0,49b2f215e41da7d80f5ec01d9e27f83f97a2e8d49b968c276d4e1a5d7aec1a1e,2025-06-23T12:15:22.803000 +CVE-2025-52921,0,0,da07986331b1b7cbed22dedcf9611ed2cfb0437eb3e0985e9ca33a204e0945b9,2025-06-23T12:15:22.970000 +CVE-2025-52922,0,0,f04adc2ccfbd757236018ffd479495a4317760651879c263d6cbb1f1eba9ecd8,2025-06-23T12:15:23.150000 CVE-2025-52923,0,0,825efd0bf97043c553869930f73d387d618324b6c5d516039439c06bdeeb2fce,2025-06-22T01:15:24.097000 CVE-2025-52926,0,0,a2ea71f5f513826223184ebdf984a9517b3b97a40b47a0432cc67e7fcc0b13bd,2025-06-23T01:15:21.877000 CVE-2025-52935,0,0,69f0a3d1fc334d25c1072a4fb7417df75df937e1592f0e78c34731ed1c3d5dec,2025-06-23T10:15:27.380000 CVE-2025-52936,0,0,5a73b32cd0cf146bc0ee081a574067937ffe0c6a2ffedc2de43fa39d77cb9bb9,2025-06-23T10:15:27.570000 -CVE-2025-52937,0,0,781c8a33e1c2e3401be105b699a54fa188d4f995d7410721a679b6dc37fbb296,2025-06-23T10:15:27.717000 +CVE-2025-52937,0,1,546c5911371065d8732d43f638a4acee46934556799b9d4d3a79d6c246ce41bb,2025-06-23T14:15:27.203000 CVE-2025-52938,0,0,32cfa0125cbed90894c155e967587051de3d80629a5cbc836d8fa783497c0b5c,2025-06-23T10:15:27.857000 CVE-2025-52939,0,0,acb57ccf8c49d776c9ae1d73e624db6ecf3f28e9fcac64a91b7b96853d88ef7b,2025-06-23T10:15:28.007000 CVE-2025-5295,0,0,d0e6aa3b032b1532910154b10cc32ceaaf64a98256f38c6f6f628cd0a1c4bacc,2025-05-28T15:01:30.720000 +CVE-2025-52967,1,1,6400c520949bb3b6a2dee7f261f5e193d9f26cdbd6767e30da7f754f88aeefc3,2025-06-23T15:15:29.163000 +CVE-2025-52968,1,1,a9658590dac69c266160ede971810619ebd88051cc14c521e59449b331bfcf05,2025-06-23T15:15:29.350000 CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000 @@ -298295,8 +298310,8 @@ CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a CVE-2025-5326,0,0,44e560162f190407a031d43fb109d883b338df688e809a58566da260b71fd2ba,2025-05-30T16:31:03.107000 CVE-2025-5327,0,0,a8b880c32053a31de283f5a9cad582c296c544f77211624787db5b92e0d637e7,2025-06-10T15:13:37.533000 CVE-2025-5328,0,0,69e2dcbfc2b85f6314db4745b576ea63b045f3b89808be8d33ed6e2b70669005,2025-06-10T15:14:10.110000 -CVE-2025-5330,0,0,6158a2895f7451b7a83ea36cd8f7d0935796ef85c800ff8d2825b1765d3a5222,2025-05-30T16:31:03.107000 -CVE-2025-5331,0,0,139c0cf46ff478a4f27313553ef136799361557eaadaf36d4364deba81609961,2025-05-30T16:31:03.107000 +CVE-2025-5330,0,1,e7ffe160dd4f6c3817c7e36e2e683e91c9ad47396ef2482f8a3aba919f7252b8,2025-06-23T14:37:01.860000 +CVE-2025-5331,0,1,3e528485905d1d35c61ee15111a6c2d55d98c95985d2190c3f8dd98dcd93e3b2,2025-06-23T14:35:13.397000 CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 CVE-2025-5334,0,0,3b25ffa10fa68a37bf0e18657dc7cc96e971a33e8fade936cdd130170872987d,2025-06-10T19:15:35.243000 CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000 @@ -298355,7 +298370,7 @@ CVE-2025-5410,0,0,60de637176ae188b21c928ddf29aeb5cb2d5057ec1cb9930e2bf7416d8e02e CVE-2025-5411,0,0,ad8be7495abcae78273f6c1ce2f42bd21b73f6b28a6ccf317309fd27de8359de,2025-06-02T17:32:17.397000 CVE-2025-5412,0,0,cdedc82e39d6eb66906e9774b875480255e558374703496c9f6705513eee4b45,2025-06-02T17:32:17.397000 CVE-2025-5416,0,0,3c77f0d13c8968958238823be4be5273e0d78b916cef66c45fb33d9adf901e4b,2025-06-20T16:15:29.553000 -CVE-2025-5419,0,1,b08932a42793eb054ff541cbe82c746308d107829d8603cd02d49ec54f5a4ae3,2025-06-23T12:15:23.323000 +CVE-2025-5419,0,0,b08932a42793eb054ff541cbe82c746308d107829d8603cd02d49ec54f5a4ae3,2025-06-23T12:15:23.323000 CVE-2025-5420,0,0,ceb88ecddbe17e7db586e3f1c0ac9514310ce698fc43cdb541522aa063e06b05,2025-06-18T15:16:05.153000 CVE-2025-5421,0,0,3056469085654c96d46b66fdc69203da1c4d21ead0f0337b85f9bb9def366019,2025-06-18T15:15:48.827000 CVE-2025-5422,0,0,06ceff0ef907c21c9cea29f6a124d5d6fb374eca4c50457fcf6fe9c1ecbdb8f7,2025-06-18T15:15:42.400000 @@ -298526,13 +298541,13 @@ CVE-2025-5637,0,0,b4095ae9d6d117e5e5fe317c037877142ad009ffe86dcd38c16540d27f7b17 CVE-2025-5638,0,0,5fa603e90eeb98583ea40591c0f1493256693a05d984ab5725744a9282518d9e,2025-06-06T20:12:17.237000 CVE-2025-5639,0,0,df69c796d2f2dcdd7b52222b3cca34eb33581a84dfcf4149ec44f708e4f12118,2025-06-06T20:12:28.340000 CVE-2025-5640,0,0,a28c86c8136e1feb945fccbeca2e1e5a219c046c15a8a6365d3963b3188e3fa7,2025-06-05T20:12:23.777000 -CVE-2025-5641,0,0,c8f7ac292f359987d075e152f8dd19ddbdc8cb4080b7282313507d85d90fd4db,2025-06-05T20:12:23.777000 -CVE-2025-5642,0,0,cae924f3bb32926376b62278ad9c9764b00eafda9dcdcffed55437957c4a363d,2025-06-05T20:12:23.777000 -CVE-2025-5643,0,0,57c31f7ef58ad4cfb41f1aa18c9c14e003f8e0e5e0c43c7be1f9c464a95aba0f,2025-06-05T20:12:23.777000 -CVE-2025-5644,0,0,68fcd4c3f74468c1b893be0bcdfa189d4bbb09f74531b7c63fdd855c7eba5da3,2025-06-05T20:12:23.777000 -CVE-2025-5645,0,0,6b6b5983242fc62d8963eedd1843baed8ebdf14003510afd8076f3d6e960291b,2025-06-05T20:12:23.777000 -CVE-2025-5646,0,0,0e51e1b0b62283efc9c8c265648b8f7caa0bb2d3d3a55d4e45aec68db4ccc7c8,2025-06-05T20:12:23.777000 -CVE-2025-5647,0,0,7d9d4815d60c08ffd7508b019b97abbfba27964e3c0da92d66215f116c0692f6,2025-06-05T20:12:23.777000 +CVE-2025-5641,0,1,d5b74ed2999cb0573a6a00c5400b18ea1376fb3a7e88a5275977b2c2932e733f,2025-06-23T14:37:57.193000 +CVE-2025-5642,0,1,07bc4ff6bdf6624bf56957684ab53a92c9369b191efa0f5f0ccbb572aed8a52a,2025-06-23T14:38:11.337000 +CVE-2025-5643,0,1,bdc7b71238ce4013f922d9b127c18310da265916fde136924493a6a34126de7b,2025-06-23T14:38:25.483000 +CVE-2025-5644,0,1,5900d2ca0f624df2ba2cda28d1db8544b5da24767efe33d6c650c6c3f7428c8e,2025-06-23T14:38:45.623000 +CVE-2025-5645,0,1,17c50a7d3445db31fbfcc3af059c43697342bb3ec0608c670b1178f5cc8192e1,2025-06-23T14:39:01.727000 +CVE-2025-5646,0,1,2af58f3f277256983114103b89acb87ac3e1b53da1079dd51f5194cdb134d619,2025-06-23T14:40:23.430000 +CVE-2025-5647,0,1,cec2cc0ef01931a062fe6cfcc4eb1a3addc899b6310cbf327d1ae9d895f9464b,2025-06-23T14:40:09.040000 CVE-2025-5648,0,0,8d8a946a9691d84bd632207adec092a07f5e621bdddce363a223111a1e12ac35,2025-06-17T18:56:04.373000 CVE-2025-5649,0,0,8d1f3267e39f86a1983625a80d2b4086de30c2bb535ef4e2d4852137479dd55a,2025-06-10T15:05:56.120000 CVE-2025-5650,0,0,c41210387d1002531a8860804a9f5e98813d1f3f1969221163975f35d5b4da41,2025-06-10T15:05:23.553000 @@ -298695,7 +298710,7 @@ CVE-2025-5871,0,0,cf8b155d3f5676937055fc70fc356be425d106281694dba873cdc0b7b3134e CVE-2025-5872,0,0,df91dff262321d8e54a907aa2d26c35e2664d50439e57f3d1baa4408ee42b93e,2025-06-09T12:15:47.880000 CVE-2025-5873,0,0,94e40892e1834c35ffd2c63a40f58e3bdf2ff473f557d19637cf12f248462e7f,2025-06-09T12:15:47.880000 CVE-2025-5874,0,0,726c9df65c566725a510f5c58b0c057c9bdfc295fa5f1ff3d2641c2157e02012,2025-06-09T12:15:47.880000 -CVE-2025-5875,0,0,f1a44dc5ddbcb686cc6855c7ce3e7a05b96ccd89226c9ae61faaca65e355748b,2025-06-12T19:15:20.893000 +CVE-2025-5875,0,1,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000 CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea88,2025-06-09T13:15:25.777000 CVE-2025-5877,0,0,e0dce4f1c575be2988ae468fd3b9f298d5610dc4a16b678a804d86d9b1adf31b,2025-06-12T16:06:47.857000 CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000 @@ -298782,7 +298797,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399 CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000 CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 -CVE-2025-6019,0,0,ebf4f12bdb263a546c3aea4ef4c7f4363c6b17ec70827c011e272bb086ea941e,2025-06-19T12:15:19.727000 +CVE-2025-6019,0,1,4ac3780c7472efb91964dc19bb6ed01f38f9812cdbb0225ce13decc142e609e7,2025-06-23T14:15:27.323000 CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 @@ -298991,40 +299006,40 @@ CVE-2025-6363,0,0,02ac2f155cec55cb8bc0cf8655350fdcf92c00dcede0bce48e58b81564cda5 CVE-2025-6364,0,0,006bf7fbb97f6b87a275c265150de651dc85857c35924c5c61f64c74246732f3,2025-06-20T21:15:22.957000 CVE-2025-6365,0,0,e7e0ed9d0d08d064f4be3e304abee4c9926e1d8a86b07b52cae6a84b3ece8e29,2025-06-20T21:15:23.140000 CVE-2025-6367,0,0,d73c83ef68be9737bb36adece1ed10045d8ea359beea0979c29b6d1ef155c944,2025-06-20T21:15:23.327000 -CVE-2025-6368,0,0,cb81926a8901fe387942e67dc5ff62172f2e6a6d4dac0103d6258bacbab4bad3,2025-06-20T22:15:19.407000 -CVE-2025-6369,0,0,84a133dcd9e41af6ac6b9ae0cbd6a94bd9d61ae9cf06f0576b45ccc264eec1a6,2025-06-20T22:15:19.613000 -CVE-2025-6370,0,0,532a6bc542d3216416f995c4afcdebbf659a5c94c03ca795e7bc37921f541102,2025-06-20T22:15:19.800000 -CVE-2025-6371,0,0,5ce0e82aa5f0bd25b3a12b3240f3c4bc5c9f18593181a42617f3238d4ae5853d,2025-06-20T23:15:19.050000 +CVE-2025-6368,0,1,b652a69ddcbda2353b55c798f12cf68deb176b8b42a2e80247181195cd741b48,2025-06-23T15:15:29.943000 +CVE-2025-6369,0,1,0b71d9d185a33961495404d89996f1b55447f0376b424dc78071d0b32068e6b4,2025-06-23T15:15:30.093000 +CVE-2025-6370,0,1,1d309b256ce7676343cc9ab52cdc93b4a1dde8c66fffb7c3460894c8840fdbe6,2025-06-23T15:15:30.220000 +CVE-2025-6371,0,1,c724d44e69a50c44fe24bc8706b1a0ea626864ff9482d6c94e657c4b6b0823a0,2025-06-23T15:15:30.370000 CVE-2025-6372,0,0,11f261fd4f301b97a69b5991b974c6cc6925c34359044898a0d8cdb4b3c65be3,2025-06-20T23:15:20.077000 CVE-2025-6373,0,0,6e218b88406a89e42e51ab0b6bce2f99cf7c4031ea9443c81ddd02dc9c9521cd,2025-06-21T00:15:22.420000 CVE-2025-6374,0,0,b64de8ac08765ef2aa29524f49bd34819f262290b45c21bdea86cc8246ba3a99,2025-06-21T01:15:29.257000 -CVE-2025-6375,0,0,ffe282b12fa3ecc9ab33fc703768c63791095f26660717266b328436b6f94862,2025-06-21T01:15:29.463000 +CVE-2025-6375,0,1,a701de4fa9acbeb9a5275341037fb4b17ed765a131529c9f5e2fc59ec01b7bfb,2025-06-23T15:15:30.500000 CVE-2025-6384,0,0,5cdec51953ac45fb27a9189069c1d2dedd736d67cb8696f7a629dd1dd7d1191f,2025-06-19T21:15:27.390000 -CVE-2025-6393,0,0,8fdf36f15a3c8062a52f965b882fa901ea85b71f63ac82f6e8e8e5dca7616106,2025-06-21T01:15:29.650000 -CVE-2025-6394,0,0,0d29effea134417ccb539ed8195e20c39f8378791ae92c1ec4fb1ad0a57731cd,2025-06-21T02:15:20.247000 +CVE-2025-6393,0,1,875eb5cbedee94117eab5461cf902033c5077e7b3e07d0a3bd519e5ba6237345,2025-06-23T15:15:30.647000 +CVE-2025-6394,0,1,2eab86707fdfae5ed188daf89a57180ba0c1b5fe5fd120e59affb028d9b4e422,2025-06-23T15:15:30.777000 CVE-2025-6399,0,0,4e1efe71bd5e4cfa8ab2ff5a9127ce00373b7f6790fd011901c9b5eee0f73f6a,2025-06-21T04:15:23.140000 CVE-2025-6400,0,0,748a86d253e9363c04b818e49ea5dee266bc2fc2cefdf3d21460cc5d4fa7f8cf,2025-06-21T06:15:19.577000 CVE-2025-6401,0,0,9d9dd7c8c9a8182d339c1e04938e080d45737af681976610632f07c1158446ae,2025-06-21T07:15:23.197000 CVE-2025-6402,0,0,86e3fb80660b4a0aa440d06524000ca21ff60f631715b366a9d8547e04bbf0c9,2025-06-21T09:15:22.193000 -CVE-2025-6403,0,0,a51a9538a82140ab5ad24f972d31a2b06348c1c5ccc754591ee3e4c8a835207f,2025-06-21T10:15:22.360000 -CVE-2025-6404,0,0,66eeb672419eb85012b33bf024c01a147d8626d097119d13d23a8fc923e26206,2025-06-21T12:15:19.313000 -CVE-2025-6405,0,0,94ef189068805426ed1d28886f493619ae325912d651a6f555f5fee7f50be3a3,2025-06-21T14:15:19.557000 -CVE-2025-6406,0,0,6044b6ade38b16e932d972b9e5b801f7e3e93ba18a4cbce60106f3dff36d2e1b,2025-06-21T14:15:19.777000 -CVE-2025-6407,0,0,8d96e89731319e20e539e96d7c3145509ea58eb03f77065ca256630a5f257ddb,2025-06-21T15:15:21.213000 -CVE-2025-6408,0,0,6de6f6330144cd9edd00fd7b4ac9056a7073a139fa6b4c1bea7a5e08f21c55d6,2025-06-21T15:15:21.397000 +CVE-2025-6403,0,1,016a930de1257f909dfa0214b23b13acb0cbf0721de6e571912b8fb6ece8484e,2025-06-23T15:15:30.903000 +CVE-2025-6404,0,1,99cf4fdc5c22d9c49f68f5b5bad6481bc45b040385f4e422b3f4765bad3cf745,2025-06-23T15:15:31.030000 +CVE-2025-6405,0,1,af14a509beaea1890451eac5c54e2f0f4017a137a06b7e6d7bf0352ad8b63992,2025-06-23T15:15:31.153000 +CVE-2025-6406,0,1,7e8561f16fc2b274624199aa840c7736970fc25a0c2fc2c1229a7df1fc57a970,2025-06-23T15:15:31.280000 +CVE-2025-6407,0,1,08818ab65b4c18d84a6e4b78723522dd326591fa638897bacfc7eaa2b313473a,2025-06-23T15:15:31.400000 +CVE-2025-6408,0,1,f6bb2de866b420e94b9e9994a67815e4a12cb8b33f99ec35f27a44695d1baeb7,2025-06-23T15:15:31.527000 CVE-2025-6409,0,0,ab58691f2ecf6e947a9564c4c0156aa3bbf03a9b1aeb4b1e15a35636ca599aaf,2025-06-21T16:15:21.407000 CVE-2025-6410,0,0,c0173d12925efeb271e682924d6b75fbb1583ecd595d8bae5f480e46133161cc,2025-06-21T17:15:23.580000 CVE-2025-6411,0,0,b8157503290e836e4debd48f60c1e95d700074b4878a50f7f6bd70907c82b061,2025-06-21T17:15:23.800000 CVE-2025-6412,0,0,6bba585df4a6a1290d4defcad0a067fb3000d58fdf83ecbd8be32ef6de55500b,2025-06-21T18:15:23.830000 -CVE-2025-6413,0,0,2c67f254879dfc9ce5e2d24bd979b380871fc604ef9b83493a225329ac05d70c,2025-06-21T18:15:24.720000 -CVE-2025-6414,0,0,b56f6b53339431609c016ed1e0e82b07ecc8f618efa5ab387037f963d66bf70d,2025-06-21T19:15:22.377000 -CVE-2025-6415,0,0,2852b6515f76b658080b4c30498f8e68b4aa0c6737918f095052eb7634b13fa0,2025-06-21T19:15:22.583000 -CVE-2025-6416,0,0,590d0de6a914b6c2d6e1a305dc8abe612106f3ade364bb3dca0c9e479668dd66,2025-06-21T20:15:26.237000 -CVE-2025-6417,0,0,e5d68cbd614c8f58368ae09f20799a678361eff6c9238f113588378a96ab8d06,2025-06-21T20:15:27.210000 -CVE-2025-6418,0,0,bf63b4b5076d801229d55234c4c4fbb4f51ea0eeeaed7f67ca98251ce3be4951,2025-06-21T21:15:23.713000 -CVE-2025-6419,0,0,8a6c0984ee0e4845996c700baf1b94b25cf3b01bafa3c0e7672286075bb4e704,2025-06-21T21:15:24.453000 -CVE-2025-6420,0,0,144970e9c742151c2f5543c7029e473aec0dc4693af2b6598db08315e80f9dc0,2025-06-21T22:15:21.687000 -CVE-2025-6421,0,0,6bb0ef4553796d4b17bf674ba71ed376e533d1be3053d4e8013f1629fd9ee955,2025-06-21T22:15:21.870000 +CVE-2025-6413,0,1,878d96cbd6373d4bbcbc7eac8e3f7b883bbdaf9647b3f8f01ffac49243778471,2025-06-23T15:15:31.657000 +CVE-2025-6414,0,1,9ea807bf9a81de1a2d462892ae7f6f355ac53ddfc19e9289e4d524342b29c22f,2025-06-23T15:15:31.800000 +CVE-2025-6415,0,1,bb5f0509b2887c056c271bf0f45ad9b70fe18acfadfacee68c2b844e143fff5b,2025-06-23T15:15:31.930000 +CVE-2025-6416,0,1,f6e0cd95d0883543e0d1f97d7088ef861ad9953436aa8a1283aa7bb720c6959e,2025-06-23T15:15:32.057000 +CVE-2025-6417,0,1,ed608dcd14204e3f1e89582f0fde89c7cb1601320a169263aa0d5bde1a7f6d40,2025-06-23T15:15:32.183000 +CVE-2025-6418,0,1,3e0b567697264438b4f5b77b0ab4d0f48f168ad26c7f87494ad73e30925bd25e,2025-06-23T15:15:32.307000 +CVE-2025-6419,0,1,8c6e63e1663c741684ad25c792cd159705ea320552f15b4bb98108113d175ee6,2025-06-23T15:15:32.433000 +CVE-2025-6420,0,1,cdb75dba0b5ce7b892adebfa0b9d7a45ff81df4b0222d01fde6da32f8eeab99c,2025-06-23T15:15:32.560000 +CVE-2025-6421,0,1,af5baab7d33200cd061f296b00b3de92031f238f561e3eb614150bcb8ec563fa,2025-06-23T15:15:32.680000 CVE-2025-6422,0,0,c573c4db3c0f20957365ddf4fca4d8cd722bee1aea05672517904a42b456062e,2025-06-21T23:15:24.563000 CVE-2025-6446,0,0,44bb6e746b3927f98410a922df7f49f7dfc756465d7a1b8c41e32b3d72a60ca9,2025-06-21T23:15:24.743000 CVE-2025-6447,0,0,d6e53d5485fb5a3d0f12bc8d5c88d5554f6d7639b5607c74f1cea40c03552c01,2025-06-22T00:15:25.220000 @@ -299032,14 +299047,14 @@ CVE-2025-6448,0,0,40cda260ec27fd5e0737735c0c34194b09100006124949d443f7335c8e347f CVE-2025-6449,0,0,116d3d2e21456f110f9a0f23b1e214947937874eabee1f30050b1cc53b689b69,2025-06-22T01:15:24.283000 CVE-2025-6450,0,0,7799bb9dd2f2f68c9e0b3e0363e03394a18b58a0cbe8e725f2b08981ea76741f,2025-06-22T01:15:24.470000 CVE-2025-6451,0,0,ddfd5352b74ff29f320f2da5b49b9c3961bbabfa82ef06d1c3b29e20d8991728,2025-06-22T02:15:22.983000 -CVE-2025-6452,0,0,2b8e28346faa58e6d3484bcfe403e681ae3784f7ff74f1db0f1381a31b4626f9,2025-06-22T03:15:30.703000 -CVE-2025-6453,0,0,5a2064a3739fd7e7d9f7912869d7cf556d01d962b9ba58469bb219f1a380c777,2025-06-22T03:15:31.490000 -CVE-2025-6455,0,0,7030be3b0bd5e42af4b95d88d445d0ed26ede0fc6d6c0af2954f844c0e0e4435,2025-06-22T03:15:31.667000 -CVE-2025-6456,0,0,aaab71baed4eff25eb5e7cd830d6087eaa8d258b3db236753226edaee963ef4c,2025-06-22T04:15:28.673000 -CVE-2025-6457,0,0,89e2e2394f7ab4504626e1a586eb1e57882f48f94d805d0b5baa21561b205507,2025-06-22T04:15:33.007000 -CVE-2025-6458,0,0,5ee272c6ce861932941fa1300632cb139e102391d0b4cbe7a7c920c66940fff5,2025-06-22T05:15:25.577000 -CVE-2025-6466,0,0,1a55de829df54f155e88c65a7c7df616f39b40de5bba4125757ad5ec58827fa8,2025-06-22T05:15:25.840000 -CVE-2025-6467,0,0,0f5613b15b5dfeda90019d16f1e82c74e114962ed1fc4106910fc5ee6d48b563,2025-06-22T06:15:23.623000 +CVE-2025-6452,0,1,63ff1d707c2d4d6191c1be973aa90ec67a6c1acf6baf2f39ac5a900fd758b3a4,2025-06-23T15:15:32.813000 +CVE-2025-6453,0,1,9c885666116121e3b884ab4ff5531440727d5c1418716ceb5b840c4a9a393584,2025-06-23T15:15:32.937000 +CVE-2025-6455,0,1,28c74c7cb9544884eb7535a971765d74e5d1c3f96dacbf9c086677c417a5fa5b,2025-06-23T15:15:33.073000 +CVE-2025-6456,0,1,2d820c12caf403f62a3f4e6b3131debc016ddc24e6880c7d796407e57d2acd28,2025-06-23T15:15:33.230000 +CVE-2025-6457,0,1,3ed47e74d5401b3a49a017fb16219dec6ef33a4d30b3bc35a29970e3e4dc0115,2025-06-23T15:15:33.357000 +CVE-2025-6458,0,1,e8f22c4aef78a28ac9577ad7f726df891a8351f52465f7e1cd96b0890bbdc9a6,2025-06-23T15:15:33.497000 +CVE-2025-6466,0,1,4976e85db194b48b1567167c969a847ccee78fb03413b69a23ee3e29a3acbdf7,2025-06-23T15:15:34.440000 +CVE-2025-6467,0,1,9a3adfa72fc7506ba417d1a5a324fa98822d0838dfb58a14722e7ce6d55815b0,2025-06-23T14:15:27.473000 CVE-2025-6468,0,0,fbd044ac936e33262d45471d5bd03b56e48368b2b44c1a71ed9578ebf513d15a,2025-06-22T08:15:24.677000 CVE-2025-6469,0,0,9aabfd74ea6320805ce8b656f216d435faba1feb3077facc77facf7f64092150,2025-06-22T08:15:25.497000 CVE-2025-6470,0,0,5f23ea5ce0815ab35440026fa17de2e18509ec334d3f2e6b8233a9348a155287,2025-06-22T09:15:25.157000 @@ -299049,7 +299064,7 @@ CVE-2025-6473,0,0,09409a4bd477f81614d70281f18b72d4f6fa78f49d1117127779c435ad3600 CVE-2025-6474,0,0,3e39c8512816416fe8c7ddf5aaed888f37c2634d5d80b0be4ec720b4c35ad5bc,2025-06-22T12:15:19.777000 CVE-2025-6475,0,0,0344ea1c6e041c7440b343720387b9179b9f0e1cabde7f3aafb90f7057fbc66d,2025-06-22T12:15:20.747000 CVE-2025-6476,0,0,d7334e2904c03dcecdcfc40845defacdd1ecf8afbe242a8181c73133e9d019d9,2025-06-22T13:15:34.470000 -CVE-2025-6477,0,0,c363fc749645eb9a46fb5c091844710d2d69ceadead07676b471ff8227d9ad79,2025-06-22T13:15:35.120000 +CVE-2025-6477,0,1,cfa2bd7fef0c902e2c30cad9bf680868cbf861e0fe517c90d1aa7af0157fb159,2025-06-23T14:15:28.330000 CVE-2025-6478,0,0,e86ea84207021fa44f32275e31374d82feb873262d1459f18c9a2e5fc8fad6ff,2025-06-22T14:15:21.467000 CVE-2025-6479,0,0,87049c82e93ed13079449e8a426feaafd7bcde7e185f10e9339b40c6bd40b18b,2025-06-22T14:15:22.193000 CVE-2025-6480,0,0,ac6d9565637ad4389fcc04e1bcce035789833b9f48dd1e237c00ebd5f3337e48,2025-06-22T15:15:20.030000 @@ -299067,11 +299082,11 @@ CVE-2025-6493,0,0,b07984a53cd9acdb838d53ec36f19bf2b78d39f60ec9fbcd3799653f00698e CVE-2025-6494,0,0,86f1220d913db6a1ab74494e021685dc10d3e076bd7d139d8673bfd67dc71200,2025-06-22T23:15:20.103000 CVE-2025-6496,0,0,2b5f2de3f64d739030644e9cc059b885cfe6a37938dff98fe008e38153a2053e,2025-06-23T00:15:23.117000 CVE-2025-6497,0,0,dc164f05cd4fbed7722e13df6028fdc1267acb81bac64b9f55e604144a684c22,2025-06-23T01:15:22.073000 -CVE-2025-6498,0,0,e397fd6388eff4605e49e02f702c966baaf229b27b4a892977e93dfba8af6a0b,2025-06-23T02:15:20.703000 -CVE-2025-6499,0,0,79de351fd958f8cff48c60f211703a7a2f4f518588c11d3c2a075eedd984adc1,2025-06-23T03:15:26.717000 -CVE-2025-6500,0,0,7d95e09fcfe5dcef69f539b205a31e4d0f3f042239be42996b6e6a77b515a447,2025-06-23T03:15:26.913000 -CVE-2025-6501,0,0,a2a90ce8173a3fdefce0f78e9d998c48de948a880e0432a9fb455b3d66b70b56,2025-06-23T03:15:27.100000 +CVE-2025-6498,0,1,7f117998d5758a3fbc3c030e1b3c62d5890f5ff09de5b53e7b548389eb48d7d0,2025-06-23T14:15:28.950000 +CVE-2025-6499,0,1,4eb7250c581d89d97dd682ec0d42a8210a61278e9906826875a49855348b804e,2025-06-23T14:15:29.077000 +CVE-2025-6500,0,1,881dc0d608000677c0cffd31356201096e6e26efc4f18eec38a2cb5c495a0250,2025-06-23T14:15:29.207000 +CVE-2025-6501,0,1,d375b1fdb8f2189e2cf1c0ea6bab2b673a1f6050f3aa39ea576b3b9a0851ae19,2025-06-23T14:15:29.337000 CVE-2025-6502,0,0,dee39bba679fa1664ff5ffd6d1f5297b6166726b2901546250d37a4402661b97,2025-06-23T04:15:24.780000 CVE-2025-6503,0,0,09279d17f7c61f97e4798e7b6e3c3fe45d55c669f7d25ad1125f5eab7e1ec9d8,2025-06-23T04:15:42.737000 -CVE-2025-6512,1,1,929074c40784a8a7e4bea63b3e8fde745aecb9b4aac7e380dbea6fff6bf1a027,2025-06-23T13:15:22.460000 -CVE-2025-6513,1,1,fce112496af3766c83513d2f7532743c646a19af3da3761627887efca2174e9f,2025-06-23T13:15:23.040000 +CVE-2025-6512,0,0,929074c40784a8a7e4bea63b3e8fde745aecb9b4aac7e380dbea6fff6bf1a027,2025-06-23T13:15:22.460000 +CVE-2025-6513,0,0,fce112496af3766c83513d2f7532743c646a19af3da3761627887efca2174e9f,2025-06-23T13:15:23.040000