Auto-Update: 2025-06-23T23:55:20.097357+00:00

This commit is contained in:
cad-safe-bot 2025-06-23 23:58:57 +00:00
parent 03b3cd9ee1
commit 237353568a
560 changed files with 11412 additions and 1969 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47294", "id": "CVE-2021-47294",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:17.323", "published": "2024-05-21T15:15:17.323",
"lastModified": "2024-11-21T06:35:48.923", "lastModified": "2025-06-23T20:19:04.490",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,71 +15,235 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netrom: Disminuir el recuento de sock cuando caducan los temporizadores de sock. La confirmaci\u00f3n 63346650c1a9 (\"netrom: cambiar a API de temporizador de sock\") cambi\u00f3 para usar la API de temporizador de sock. Reemplaza mod_timer() por sk_reset_timer() y del_timer() por sk_stop_timer(). La funci\u00f3n sk_reset_timer() aumentar\u00e1 el recuento del sock si se llama en un temporizador inactivo, por lo tanto, en caso de que el temporizador expire, debemos disminuir el recuento nosotros mismos en el controlador; de lo contrario, el recuento del calcet\u00edn se desequilibrar\u00e1 y el sock nunca ser\u00e1 liberado." "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netrom: Disminuir el recuento de sock cuando caducan los temporizadores de sock. La confirmaci\u00f3n 63346650c1a9 (\"netrom: cambiar a API de temporizador de sock\") cambi\u00f3 para usar la API de temporizador de sock. Reemplaza mod_timer() por sk_reset_timer() y del_timer() por sk_stop_timer(). La funci\u00f3n sk_reset_timer() aumentar\u00e1 el recuento del sock si se llama en un temporizador inactivo, por lo tanto, en caso de que el temporizador expire, debemos disminuir el recuento nosotros mismos en el controlador; de lo contrario, el recuento del calcet\u00edn se desequilibrar\u00e1 y el sock nunca ser\u00e1 liberado."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-672"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.173",
"versionEndExcluding": "4.4.277",
"matchCriteriaId": "3E3226CA-19FE-4D01-AF65-32A8C5BF4B1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9.155",
"versionEndExcluding": "4.9.277",
"matchCriteriaId": "9BF1259C-DF0B-48E1-8EA8-2AB91A7AA4E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.98",
"versionEndExcluding": "4.14.241",
"matchCriteriaId": "E285CAFB-29D0-4687-BDD6-1EAB4F397AC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.20",
"versionEndExcluding": "4.19.199",
"matchCriteriaId": "1DFDBA04-2E4D-4E4A-A386-237989BB8C1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndExcluding": "5.4.136",
"matchCriteriaId": "89436D92-8C87-413A-8CD9-4CF06FCCEABD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.54",
"matchCriteriaId": "1BD5A2EE-859F-40FC-BDAC-167AAE37C870"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.13.6",
"matchCriteriaId": "512C22FC-1524-4E6F-9E62-4F4B7B6E0576"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:3.18.134:*:*:*:*:*:*:*",
"matchCriteriaId": "407D22E1-55CF-4117-B460-329990673A2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF86F57-4FAC-4E41-8FB4-F35F985F4DC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "71268287-21A8-4488-AA4F-23C473153131"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "23B9E5C6-FAB5-4A02-9E39-27C8787B0991"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3", "url": "https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef", "url": "https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8", "url": "https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a", "url": "https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29", "url": "https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950", "url": "https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf", "url": "https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250", "url": "https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3", "url": "https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef", "url": "https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8", "url": "https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a", "url": "https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29", "url": "https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950", "url": "https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf", "url": "https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250", "url": "https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47296", "id": "CVE-2021-47296",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:17.477", "published": "2024-05-21T15:15:17.477",
"lastModified": "2024-11-21T06:35:49.233", "lastModified": "2025-06-23T20:19:54.287",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,47 +15,162 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: PPC: correcci\u00f3n de fuga de kvm_arch_vcpu_ioctl vcpu_load. No se llama a vcpu_put si falla la copia del usuario. Esto puede provocar da\u00f1os y bloqueos del notificador preventivo, entre otros problemas." "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: PPC: correcci\u00f3n de fuga de kvm_arch_vcpu_ioctl vcpu_load. No se llama a vcpu_put si falla la copia del usuario. Esto puede provocar da\u00f1os y bloqueos del notificador preventivo, entre otros problemas."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.18",
"versionEndExcluding": "4.19.199",
"matchCriteriaId": "A14B3FB8-763B-434E-88A7-97AC33E54F7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.136",
"matchCriteriaId": "E1FCD98C-8886-4844-B7AF-C42731DF9465"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.54",
"matchCriteriaId": "1BD5A2EE-859F-40FC-BDAC-167AAE37C870"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.13.6",
"matchCriteriaId": "512C22FC-1524-4E6F-9E62-4F4B7B6E0576"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "71268287-21A8-4488-AA4F-23C473153131"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "23B9E5C6-FAB5-4A02-9E39-27C8787B0991"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50", "url": "https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209", "url": "https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252", "url": "https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533", "url": "https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151", "url": "https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50", "url": "https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209", "url": "https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252", "url": "https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533", "url": "https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151", "url": "https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2021-47688",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T20:15:26.957",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In WhiteBeam 0.2.0 through 0.2.1 before 0.2.2, a user with local access to a server can bypass the allow-list functionality because a file can be truncated in the OpenFileDescriptor action before the VerifyCanWrite action is performed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.5,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-696"
}
]
}
],
"references": [
{
"url": "https://github.com/WhiteBeamSec/WhiteBeam/pull/22",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/WhiteBeamSec/WhiteBeam/security/advisories/GHSA-3f8r-9483-pfxj",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/WhiteBeamSec/WhiteBeam/security/policy",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43378", "id": "CVE-2023-43378",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T18:15:57.970", "published": "2025-04-22T18:15:57.970",
"lastModified": "2025-04-23T15:15:59.213", "lastModified": "2025-06-23T18:15:42.937",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digitaldruid:hoteldruid:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D702D98A-1616-4D1A-90F0-CEE49FB8707F"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://flashy-lemonade-192.notion.site/Cross-site-scripting-in-hoteldruid-version-3-0-5-via-commento1_1-post-parameter-44ff18cb61cd4a80bbba75d5e4360ee4", "url": "https://flashy-lemonade-192.notion.site/Cross-site-scripting-in-hoteldruid-version-3-0-5-via-commento1_1-post-parameter-44ff18cb61cd4a80bbba75d5e4360ee4",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://flashy-lemonade-192.notion.site/Cross-site-scripting-in-hoteldruid-version-3-0-5-via-commento1_1-post-parameter-44ff18cb61cd4a80bbba75d5e4360ee4", "url": "https://flashy-lemonade-192.notion.site/Cross-site-scripting-in-hoteldruid-version-3-0-5-via-commento1_1-post-parameter-44ff18cb61cd4a80bbba75d5e4360ee4",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-47029",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T18:15:20.630",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via a crafted POST request to the UserService component"
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1oX5uKnWGiYMaBxnBuqPiOA53XLxv1Ef4/view?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47029/CVE-2023-47029.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-47030",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T20:15:27.740",
"lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via a GET request to a UserService SOAP API endpoint to validate if a user exists."
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1ujUcB8XEs78WwWzs8cmD-u1Twqi10yEh/view?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47030/CVE-2023-47030.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47031", "id": "CVE-2023-47031",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T17:15:27.313", "published": "2025-06-23T17:15:27.313",
"lastModified": "2025-06-23T17:15:27.313", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47032", "id": "CVE-2023-47032",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:23.920", "published": "2025-06-23T16:15:23.920",
"lastModified": "2025-06-23T16:15:23.920", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47294", "id": "CVE-2023-47294",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.493", "published": "2025-06-23T16:15:24.493",
"lastModified": "2025-06-23T16:15:24.493", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47295", "id": "CVE-2023-47295",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.623", "published": "2025-06-23T16:15:24.623",
"lastModified": "2025-06-23T16:15:24.623", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47297", "id": "CVE-2023-47297",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T15:15:25.940", "published": "2025-06-23T15:15:25.940",
"lastModified": "2025-06-23T15:15:25.940", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47298", "id": "CVE-2023-47298",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T15:15:26.700", "published": "2025-06-23T15:15:26.700",
"lastModified": "2025-06-23T15:15:26.700", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48978", "id": "CVE-2023-48978",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T15:15:26.890", "published": "2025-06-23T15:15:26.890",
"lastModified": "2025-06-23T15:15:26.890", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50450", "id": "CVE-2023-50450",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.743", "published": "2025-06-23T16:15:24.743",
"lastModified": "2025-06-23T16:15:24.743", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52722", "id": "CVE-2023-52722",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-28T00:15:07.270", "published": "2024-04-28T00:15:07.270",
"lastModified": "2024-12-04T21:15:19.983", "lastModified": "2025-06-23T18:35:47.363",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.03.1",
"matchCriteriaId": "62DFF97A-B408-4992-940C-5AEAFCB69A99"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2", "url": "http://www.openwall.com/lists/oss-security/2024/06/28/2",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List"
]
}, },
{ {
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Patch"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2", "url": "http://www.openwall.com/lists/oss-security/2024/06/28/2",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}, },
{ {
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1", "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-5600", "id": "CVE-2023-5600",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2025-06-20T20:15:26.860", "published": "2025-06-20T20:15:26.860",
"lastModified": "2025-06-20T20:15:26.860", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. Arbitrary access to the titles of an private specific references could be leaked through the service-desk custom email template." "value": "An issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. Arbitrary access to the titles of an private specific references could be leaked through the service-desk custom email template."
},
{
"lang": "es",
"value": "Se ha detectado un problema en GitLab EE que afecta a todas las versiones (desde la 16.0 hasta la 16.3.6), a todas las versiones (desde la 16.4 hasta la 16.4.2) y a todas las versiones (desde la 16.5 hasta la 16.5.1). El acceso arbitrario a los t\u00edtulos de referencias privadas espec\u00edficas podr\u00eda filtrarse a trav\u00e9s de la plantilla de correo electr\u00f3nico personalizada del servicio de asistencia."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21211", "id": "CVE-2024-21211",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:10.050", "published": "2024-10-15T20:15:10.050",
"lastModified": "2024-11-21T08:53:58.940", "lastModified": "2025-06-23T19:11:06.527",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,94 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "93A899CF-69C5-46A3-BE20-E9F128FB079E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "44A007AC-88D1-4F18-B1AD-C69600AD643C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "DDDE5C6D-036C-42FC-BD31-366175914F3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4162209C-031A-4AD9-9F19-445236332DA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD0AB0E-208D-4856-9F31-3A4BB5213FB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:23:*:*:*:*:*:*:*",
"matchCriteriaId": "9137A4EB-820C-4F05-983A-5534CFB0E019"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:23:*:*:*:*:*:*:*",
"matchCriteriaId": "5792796D-D244-4382-8DE2-30359F5CD9CD"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20241018-0008/", "url": "https://security.netapp.com/advisory/ntap-20241018-0008/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24916", "id": "CVE-2024-24916",
"sourceIdentifier": "cve@checkpoint.com", "sourceIdentifier": "cve@checkpoint.com",
"published": "2025-06-19T14:15:44.983", "published": "2025-06-19T14:15:44.983",
"lastModified": "2025-06-20T14:15:26.667", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29120", "id": "CVE-2024-29120",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-07-17T15:15:14.090", "published": "2024-07-17T15:15:14.090",
"lastModified": "2025-02-13T18:17:49.520", "lastModified": "2025-06-23T18:09:18.427",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,22 +61,55 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.1.4",
"matchCriteriaId": "EA1D77DB-B854-44DA-9749-A3F326BD4D06"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/07/17/4", "url": "http://www.openwall.com/lists/oss-security/2024/07/17/4",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List"
]
}, },
{ {
"url": "https://lists.apache.org/thread/y3oqz7l8vd7jxxx3z2khgl625nvfr60j", "url": "https://lists.apache.org/thread/y3oqz7l8vd7jxxx3z2khgl625nvfr60j",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/07/17/4", "url": "http://www.openwall.com/lists/oss-security/2024/07/17/4",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}, },
{ {
"url": "https://lists.apache.org/thread/y3oqz7l8vd7jxxx3z2khgl625nvfr60j", "url": "https://lists.apache.org/thread/y3oqz7l8vd7jxxx3z2khgl625nvfr60j",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33452", "id": "CVE-2024-33452",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T16:15:44.200", "published": "2025-04-22T16:15:44.200",
"lastModified": "2025-04-23T14:08:13.383", "lastModified": "2025-06-23T18:20:26.140",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,40 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openresty:lua-nginx-module:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.10.26",
"matchCriteriaId": "8CD86BCC-0708-45D6-88A4-522BFE60E013"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn", "url": "https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://www.benasin.space/2025/03/18/OpenResty-lua-nginx-module-v0-10-26-HTTP-Request-Smuggling-in-HEAD-requests/", "url": "https://www.benasin.space/2025/03/18/OpenResty-lua-nginx-module-v0-10-26-HTTP-Request-Smuggling-in-HEAD-requests/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35324", "id": "CVE-2024-35324",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-28T16:15:16.893", "published": "2024-05-28T16:15:16.893",
"lastModified": "2024-11-21T09:20:08.497", "lastModified": "2025-06-23T18:09:30.797",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:douchat:douchat:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CC284F5B-4C7A-4517-A14E-44B2BC7FF30B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/w0x68y/cve-lists/blob/main/CMS/Douchat/Douchat%204.0.5%20arbitrary%20file%20upload%20vulnerability.md", "url": "https://github.com/w0x68y/cve-lists/blob/main/CMS/Douchat/Douchat%204.0.5%20arbitrary%20file%20upload%20vulnerability.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
}, },
{ {
"url": "https://github.com/w0x68y/cve-lists/blob/main/CMS/Douchat/Douchat%204.0.5%20arbitrary%20file%20upload%20vulnerability.md", "url": "https://github.com/w0x68y/cve-lists/blob/main/CMS/Douchat/Douchat%204.0.5%20arbitrary%20file%20upload%20vulnerability.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3511", "id": "CVE-2024-3511",
"sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8", "sourceIdentifier": "ed10eef1-636d-4fbe-9993-6890dfa878f8",
"published": "2025-06-23T09:15:21.580", "published": "2025-06-23T09:15:21.580",
"lastModified": "2025-06-23T09:15:21.580", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36428", "id": "CVE-2024-36428",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-27T23:15:13.120", "published": "2024-05-27T23:15:13.120",
"lastModified": "2024-11-21T09:22:09.770", "lastModified": "2025-06-23T18:09:47.230",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,51 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:orangehrm:orangehrm:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5547F1-32CB-4404-8984-4A99F9DFE142"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/4rdr/proofs/blob/main/info/OrangeHRM_3.3.3_SQLi_via_sortOrder.md", "url": "https://github.com/4rdr/proofs/blob/main/info/OrangeHRM_3.3.3_SQLi_via_sortOrder.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://sourceforge.net/projects/orangehrm/files/stable/3.3.3/", "url": "https://sourceforge.net/projects/orangehrm/files/stable/3.3.3/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/4rdr/proofs/blob/main/info/OrangeHRM_3.3.3_SQLi_via_sortOrder.md", "url": "https://github.com/4rdr/proofs/blob/main/info/OrangeHRM_3.3.3_SQLi_via_sortOrder.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://sourceforge.net/projects/orangehrm/files/stable/3.3.3/", "url": "https://sourceforge.net/projects/orangehrm/files/stable/3.3.3/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40445", "id": "CVE-2024-40445",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T14:15:24.173", "published": "2025-04-22T14:15:24.173",
"lastModified": "2025-04-30T16:15:33.550", "lastModified": "2025-06-23T18:33:00.807",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,53 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ctan:mimetex:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.77",
"matchCriteriaId": "390BB0AB-AFF9-4A3F-A1D3-0CE9125F9B64"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/Oefenweb/mimetex/blob/master/mimetex.c#L12414-L12423", "url": "https://github.com/Oefenweb/mimetex/blob/master/mimetex.c#L12414-L12423",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/TaiYou-TW/CVE-2024-40445_CVE-2024-40446/", "url": "https://github.com/TaiYou-TW/CVE-2024-40445_CVE-2024-40446/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Mitigation"
]
}, },
{ {
"url": "https://youtu.be/OII16TteaJw", "url": "https://youtu.be/OII16TteaJw",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://youtu.be/W2KPHFNfgrg", "url": "https://youtu.be/W2KPHFNfgrg",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40446", "id": "CVE-2024-40446",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T14:15:24.327", "published": "2025-04-22T14:15:24.327",
"lastModified": "2025-04-23T15:15:59.513", "lastModified": "2025-06-23T18:31:24.940",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ctan:mimetex:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.77",
"matchCriteriaId": "390BB0AB-AFF9-4A3F-A1D3-0CE9125F9B64"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/TaiYou-TW/CVE-2024-40445_CVE-2024-40446/", "url": "https://github.com/TaiYou-TW/CVE-2024-40445_CVE-2024-40446/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Mitigation"
]
}, },
{ {
"url": "https://youtu.be/S3cmZkWIi6o", "url": "https://youtu.be/S3cmZkWIi6o",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4023", "id": "CVE-2024-4023",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:32.473", "published": "2025-03-20T10:15:32.473",
"lastModified": "2025-03-20T10:15:32.473", "lastModified": "2025-06-23T20:46:33.523",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flatpress:flatpress:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD15C4E9-8A2B-4104-AF8A-FFB196940AAF"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/flatpressblog/flatpress/commit/3c9cc69364a45fd3f92d4bd606344b5dd1205d6a", "url": "https://github.com/flatpressblog/flatpress/commit/3c9cc69364a45fd3f92d4bd606344b5dd1205d6a",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://huntr.com/bounties/ed803c13-0858-4c22-93ba-bf2384ab1e9d", "url": "https://huntr.com/bounties/ed803c13-0858-4c22-93ba-bf2384ab1e9d",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-4025", "id": "CVE-2024-4025",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2025-06-20T19:15:35.290", "published": "2025-06-20T19:15:35.290",
"lastModified": "2025-06-20T19:15:35.290", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions from 7.10 prior before 16.11.5, version 17.0 before 17.0.3, and 17.1 before 17.1.1. It is possible for an attacker to cause a denial of service using a crafted markdown page." "value": "A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions from 7.10 prior before 16.11.5, version 17.0 before 17.0.3, and 17.1 before 17.1.1. It is possible for an attacker to cause a denial of service using a crafted markdown page."
},
{
"lang": "es",
"value": "Se ha detectado una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en GitLab CE/EE que afecta a todas las versiones desde la 7.10 hasta la 16.11.5, la 17.0 hasta la 17.0.3 y la 17.1 hasta la 17.1.1. Un atacante podr\u00eda provocar una denegaci\u00f3n de servicio mediante una p\u00e1gina de Markdown manipulada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42733", "id": "CVE-2024-42733",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-07T21:15:17.080", "published": "2025-03-07T21:15:17.080",
"lastModified": "2025-03-10T17:15:34.673", "lastModified": "2025-06-23T19:40:09.470",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docmosis:tornado:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.9.7",
"matchCriteriaId": "4C02A16A-8B3B-4462-AF88-72FF3625425C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/Docmosis/tornado-docker/issues/14", "url": "https://github.com/Docmosis/tornado-docker/issues/14",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://github.com/Marsman1996/pocs/blob/master/redox/CVE-2024-57492/README.md", "url": "https://github.com/Marsman1996/pocs/blob/master/redox/CVE-2024-57492/README.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45208", "id": "CVE-2024-45208",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.097", "published": "2025-06-19T00:15:21.097",
"lastModified": "2025-06-19T00:15:21.097", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566", "url": "https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45347", "id": "CVE-2024-45347",
"sourceIdentifier": "security@xiaomi.com", "sourceIdentifier": "security@xiaomi.com",
"published": "2025-06-23T10:15:26.397", "published": "2025-06-23T10:15:26.397",
"lastModified": "2025-06-23T10:15:26.397", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46546", "id": "CVE-2024-46546",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T14:15:24.440", "published": "2025-04-22T14:15:24.440",
"lastModified": "2025-04-23T14:08:13.383", "lastModified": "2025-06-23T18:28:43.643",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,18 +51,57 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nextu:fleta_ax1500_firmware:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CB9EDAF4-94E1-4D1D-8C1E-7717D6C88E17"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nextu:fleta_ax1500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "159A9402-F093-407C-9D34-7F39F6F1A760"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://ez-net.co.kr/new_2012/customer/download_view.php?cid=&sid=&goods=&cate=&q=&seq=233", "url": "https://ez-net.co.kr/new_2012/customer/download_view.php?cid=&sid=&goods=&cate=&q=&seq=233",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://ez-net.co.kr/new_2012/product/view.php?cid=461&sid=467&q=%C7%C3%B7%B9%C5%B8&seq=3479&page=", "url": "https://ez-net.co.kr/new_2012/product/view.php?cid=461&sid=467&q=%C7%C3%B7%B9%C5%B8&seq=3479&page=",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://gist.github.com/laskdjlaskdj12/5b29b8b68f8a2279c9294708f080496b", "url": "https://gist.github.com/laskdjlaskdj12/5b29b8b68f8a2279c9294708f080496b",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-4994", "id": "CVE-2024-4994",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2025-06-20T19:15:35.460", "published": "2025-06-20T19:15:35.460",
"lastModified": "2025-06-20T19:15:35.460", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16.1.0 before 16.11.5, all versions starting from 17.0 before 17.0.3, all versions starting from 17.1.0 before 17.1.1 which allowed for a CSRF attack on GitLab's GraphQL API leading to the execution of arbitrary GraphQL mutations." "value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16.1.0 before 16.11.5, all versions starting from 17.0 before 17.0.3, all versions starting from 17.1.0 before 17.1.1 which allowed for a CSRF attack on GitLab's GraphQL API leading to the execution of arbitrary GraphQL mutations."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones desde la 16.1.0 anterior a la 16.11.5, todas las versiones desde la 17.0 anterior a la 17.0.3 y todas las versiones desde la 17.1.0 anterior a la 17.1.1, lo que permiti\u00f3 un ataque CSRF a la API GraphQL de GitLab que provoc\u00f3 la ejecuci\u00f3n de mutaciones arbitrarias de GraphQL."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-53298", "id": "CVE-2024-53298",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2025-06-20T14:15:26.827", "published": "2025-06-20T14:15:26.827",
"lastModified": "2025-06-20T14:15:26.827", "lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.1, contains a missing authorization vulnerability in the NFS export. An unauthenticated attacker with remote access could potentially exploit this vulnerability leading to unauthorized filesystem access. The attacker may be able to read, modify, and delete arbitrary files. This vulnerability is considered critical as it can be leveraged to fully compromise the system. Dell recommends customers to upgrade at the earliest opportunity." "value": "Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.1, contains a missing authorization vulnerability in the NFS export. An unauthenticated attacker with remote access could potentially exploit this vulnerability leading to unauthorized filesystem access. The attacker may be able to read, modify, and delete arbitrary files. This vulnerability is considered critical as it can be leveraged to fully compromise the system. Dell recommends customers to upgrade at the earliest opportunity."
},
{
"lang": "es",
"value": "Dell PowerScale OneFS, versiones 9.5.0.0 a 9.10.0.1, presenta una vulnerabilidad de falta de autorizaci\u00f3n en la exportaci\u00f3n de NFS. Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda acceso no autorizado al sistema de archivos. El atacante podr\u00eda leer, modificar y eliminar archivos arbitrarios. Esta vulnerabilidad se considera cr\u00edtica, ya que puede utilizarse para comprometer completamente el sistema. Dell recomienda a los clientes actualizar a la versi\u00f3n anterior."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53307", "id": "CVE-2024-53307",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T18:15:29.373", "published": "2025-03-10T18:15:29.373",
"lastModified": "2025-03-10T18:15:29.373", "lastModified": "2025-06-23T20:08:13.233",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,18 +51,47 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:evisions:maps:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.10.2.2678",
"matchCriteriaId": "E1F7ACE1-3F90-4B87-B46A-C962868BC824"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/Xib3rR4dAr/bf754848f1cd77162f79226144b04648", "url": "https://gist.github.com/Xib3rR4dAr/bf754848f1cd77162f79226144b04648",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://webhelp.evisions.com/releaseguides/maps/default.htm#6.11/6.11%20Release%20Notes.htm?TocPath=MAPS%25206.11%2520Release%2520Guide%257C_____3", "url": "https://webhelp.evisions.com/releaseguides/maps/default.htm#6.11/6.11%20Release%20Notes.htm?TocPath=MAPS%25206.11%2520Release%2520Guide%257C_____3",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}, },
{ {
"url": "https://gist.github.com/Xib3rR4dAr/bf754848f1cd77162f79226144b04648", "url": "https://gist.github.com/Xib3rR4dAr/bf754848f1cd77162f79226144b04648",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53591", "id": "CVE-2024-53591",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-18T21:15:43.260", "published": "2025-04-18T21:15:43.260",
"lastModified": "2025-04-21T14:23:45.950", "lastModified": "2025-06-23T19:41:15.590",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seclore:seclore:3.27.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "121C5C1E-DA3A-41D8-A2DC-01AF90989750"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/aljoharasubaie/CVE-2024-53591", "url": "https://github.com/aljoharasubaie/CVE-2024-53591",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-54172", "id": "CVE-2024-54172",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-18T17:15:28.160", "published": "2025-06-18T17:15:28.160",
"lastModified": "2025-06-18T17:15:28.160", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts." "value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts."
},
{
"lang": "es",
"value": "IBM Sterling B2B Integrator e IBM Sterling File Gateway 6.0.0.0 a 6.1.2.6 y 6.2.0.0 a 6.2.0.4 son vulnerables a cross-site request forgery, lo que podr\u00eda permitir que un atacante ejecute acciones maliciosas y no autorizadas transmitidas desde un usuario en el que el sitio web conf\u00eda."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-54183", "id": "CVE-2024-54183",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-18T16:15:26.807", "published": "2025-06-18T16:15:26.807",
"lastModified": "2025-06-18T16:15:26.807", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." "value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
},
{
"lang": "es",
"value": "IBM Sterling B2B Integrator e IBM Sterling File Gateway (versiones 6.0.0.0 a 6.1.2.6 y 6.2.0.0 a 6.2.0.4) son vulnerables a ataques de cross-site scripting. Esta vulnerabilidad permite a un usuario autenticado incrustar c\u00f3digo JavaScript arbitrario en la interfaz web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55199", "id": "CVE-2024-55199",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T18:15:29.757", "published": "2025-03-10T18:15:29.757",
"lastModified": "2025-03-10T18:15:29.757", "lastModified": "2025-06-23T20:10:31.250",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,18 +51,44 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:celk:celk_saude:3.1.252.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0F77EE-A79E-45C1-B6A7-8B7FC318225D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55199", "url": "https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55199",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://portswigger.net/web-security/cross-site-scripting/stored", "url": "https://portswigger.net/web-security/cross-site-scripting/stored",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Technical Description"
]
}, },
{ {
"url": "https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55199", "url": "https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55199",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7586", "id": "CVE-2024-7586",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2025-06-20T14:15:26.983", "published": "2025-06-20T14:15:26.983",
"lastModified": "2025-06-20T14:15:26.983", "lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in GitLab EE affecting all versions starting from 17.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, where webhook deletion audit log preserved auth credentials." "value": "An issue was discovered in GitLab EE affecting all versions starting from 17.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, where webhook deletion audit log preserved auth credentials."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en GitLab EE que afecta a todas las versiones desde la 17.0 anterior a la 17.0.6, desde la 17.1 anterior a la 17.1.4 y desde la 17.2 anterior a la 17.2.2, donde el registro de auditor\u00eda de eliminaci\u00f3n de webhook conservaba las credenciales de autenticaci\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8789", "id": "CVE-2024-8789",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:44.340", "published": "2025-03-20T10:15:44.340",
"lastModified": "2025-03-20T10:15:44.340", "lastModified": "2025-06-23T20:44:47.390",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,16 +49,51 @@
"value": "CWE-400" "value": "CWE-400"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.23",
"matchCriteriaId": "1867D23D-5A19-4541-8258-E7F901C5F468"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/lunary-ai/lunary/commit/7ff89b0304d191534b924cf063f3648206d497fa", "url": "https://github.com/lunary-ai/lunary/commit/7ff89b0304d191534b924cf063f3648206d497fa",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://huntr.com/bounties/e32f5f0d-bd46-4268-b6b1-619e07c6fda3", "url": "https://huntr.com/bounties/e32f5f0d-bd46-4268-b6b1-619e07c6fda3",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1348", "id": "CVE-2025-1348",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-18T17:15:28.360", "published": "2025-06-18T17:15:28.360",
"lastModified": "2025-06-18T17:15:28.360", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 could allow a local user to obtain sensitive information from a user\u2019s web browser cache due to not using a suitable caching policy." "value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 could allow a local user to obtain sensitive information from a user\u2019s web browser cache due to not using a suitable caching policy."
},
{
"lang": "es",
"value": "IBM Sterling B2B Integrator e IBM Sterling File Gateway 6.0.0.0 a 6.1.2.6 y 6.2.0.0 a 6.2.0.4 podr\u00edan permitir que un usuario local obtenga informaci\u00f3n confidencial del cach\u00e9 del navegador web de un usuario debido a que no utilizan una pol\u00edtica de almacenamiento en cach\u00e9 adecuada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1349", "id": "CVE-2025-1349",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-18T17:15:28.560", "published": "2025-06-18T17:15:28.560",
"lastModified": "2025-06-18T17:15:28.560", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 \n\nis vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." "value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 \n\nis vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
},
{
"lang": "es",
"value": "IBM Sterling B2B Integrator e IBM Sterling File Gateway (versiones 6.0.0.0 a 6.1.2.6 y 6.2.0.0 a 6.2.0.4) son vulnerables a Cross-site Scripting almacenado. Esta vulnerabilidad permite a un usuario con privilegios incrustar c\u00f3digo JavaScript arbitrario en la interfaz web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1987", "id": "CVE-2025-1987",
"sourceIdentifier": "cve-requests@bitdefender.com", "sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2025-06-21T22:15:21.510", "published": "2025-06-21T22:15:21.510",
"lastModified": "2025-06-21T22:15:21.510", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A Cross-Site Scripting (XSS)\u00a0vulnerability has been identified in Psono-Client\u2019s handling of vault entries of type website_password and bookmark, as used in Bitdefender SecurePass. The client does not properly sanitize the URL field in these entries. As a result, an attacker can craft a malicious vault entry (or trick a user into creating or importing one) with a javascript:URL. When the user interacts with this entry (for example, by clicking or opening it), the application will execute the malicious JavaScript in the context of the Psono vault. This allows an attacker to run arbitrary code in the victim\u2019s browser, potentially giving them access to the user\u2019s password vault and sensitive data." "value": "A Cross-Site Scripting (XSS)\u00a0vulnerability has been identified in Psono-Client\u2019s handling of vault entries of type website_password and bookmark, as used in Bitdefender SecurePass. The client does not properly sanitize the URL field in these entries. As a result, an attacker can craft a malicious vault entry (or trick a user into creating or importing one) with a javascript:URL. When the user interacts with this entry (for example, by clicking or opening it), the application will execute the malicious JavaScript in the context of the Psono vault. This allows an attacker to run arbitrary code in the victim\u2019s browser, potentially giving them access to the user\u2019s password vault and sensitive data."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de Cross-Site Scripting (XSS) en la gesti\u00f3n por parte de Psono-Client de las entradas de la b\u00f3veda de tipo \"website_password\" y \"bookmark\", utilizadas en Bitdefender SecurePass. El cliente no depura correctamente el campo URL de estas entradas. Como resultado, un atacante puede manipular una entrada de b\u00f3veda maliciosa (o enga\u00f1ar al usuario para que la cree o importe) con una URL javascript:URL. Cuando el usuario interact\u00faa con esta entrada (por ejemplo, al hacer clic o abrirla), la aplicaci\u00f3n ejecuta el JavaScript malicioso en el contexto de la b\u00f3veda de Psono. Esto permite a un atacante ejecutar c\u00f3digo arbitrario en el navegador de la v\u00edctima, lo que podr\u00eda otorgarle acceso a la b\u00f3veda de contrase\u00f1as y a datos confidenciales del usuario."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-20234", "id": "CVE-2025-20234",
"sourceIdentifier": "psirt@cisco.com", "sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-18T17:15:28.833", "published": "2025-06-18T17:15:28.833",
"lastModified": "2025-06-18T17:15:28.833", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.\r\nFor a description of this vulnerability, see the ." "value": "A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.\r\nFor a description of this vulnerability, see the ."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el procesamiento de Universal Disk Format (UDF) de ClamAV podr\u00eda permitir que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una sobrelectura de memoria durante el an\u00e1lisis de archivos UDF. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un archivo manipulado con contenido UDF para que ClamAV lo analice en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante finalizar el proceso de an\u00e1lisis de ClamAV, lo que provocar\u00eda una denegaci\u00f3n de servicio (DoS) en el software afectado. Para obtener una descripci\u00f3n de esta vulnerabilidad, consulte [enlace faltante]."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-20260", "id": "CVE-2025-20260",
"sourceIdentifier": "psirt@cisco.com", "sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-18T18:15:23.270", "published": "2025-06-18T18:15:23.270",
"lastModified": "2025-06-18T18:15:23.270", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device.\r\n\r\nThis vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process." "value": "A vulnerability in the PDF scanning processes of ClamAV could allow an unauthenticated, remote attacker to cause a buffer overflow condition, cause a denial of service (DoS) condition, or execute arbitrary code on an affected device.\r\n\r\nThis vulnerability exists because memory buffers are allocated incorrectly when PDF files are processed. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to trigger a buffer overflow, likely resulting in the termination of the ClamAV scanning process and a DoS condition on the affected software. Although unproven, there is also a possibility that an attacker could leverage the buffer overflow to execute arbitrary code with the privileges of the ClamAV process."
},
{
"lang": "es",
"value": "Una vulnerabilidad en los procesos de escaneo de PDF de ClamAV podr\u00eda permitir que un atacante remoto no autenticado provoque un desbordamiento de b\u00fafer, una denegaci\u00f3n de servicio (DoS) o ejecute c\u00f3digo arbitrario en un dispositivo afectado. Esta vulnerabilidad se debe a que los b\u00faferes de memoria se asignan incorrectamente al procesar archivos PDF. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un archivo PDF manipulado para que ClamAV lo escanee en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante provocar un desbordamiento de b\u00fafer, lo que probablemente resultar\u00eda en la finalizaci\u00f3n del proceso de escaneo de ClamAV y una denegaci\u00f3n de servicio (DoS) en el software afectado. Aunque no se ha demostrado, tambi\u00e9n existe la posibilidad de que un atacante aproveche el desbordamiento de b\u00fafer para ejecutar c\u00f3digo arbitrario con los privilegios del proceso de ClamAV."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-20271", "id": "CVE-2025-20271",
"sourceIdentifier": "psirt@cisco.com", "sourceIdentifier": "psirt@cisco.com",
"published": "2025-06-18T17:15:29.053", "published": "2025-06-18T17:15:29.053",
"lastModified": "2025-06-18T17:15:29.053", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the Cisco AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to variable initialization errors when an SSL VPN session is established. An attacker could exploit this vulnerability by sending a sequence of crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of all established SSL VPN sessions and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established, effectively making the Cisco AnyConnect VPN service unavailable for all legitimate users." "value": "A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the Cisco AnyConnect service on an affected device.\r\n\r\nThis vulnerability is due to variable initialization errors when an SSL VPN session is established. An attacker could exploit this vulnerability by sending a sequence of crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of all established SSL VPN sessions and forcing remote users to initiate a new VPN connection and re-authenticate. A sustained attack could prevent new SSL VPN connections from being established, effectively making the Cisco AnyConnect VPN service unavailable for all legitimate users."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el servidor VPN Cisco AnyConnect de los dispositivos Cisco Meraki MX y Cisco Meraki Z Series Teleworker Gateway podr\u00eda permitir que un atacante remoto no autenticado provoque una denegaci\u00f3n de servicio (DoS) en el servicio Cisco AnyConnect de un dispositivo afectado. Esta vulnerabilidad se debe a errores de inicializaci\u00f3n variables al establecer una sesi\u00f3n VPN SSL. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una secuencia de solicitudes HTTPS manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante reiniciar el servidor VPN Cisco AnyConnect, lo que provocar\u00eda el fallo de todas las sesiones VPN SSL establecidas y obligar\u00eda a los usuarios remotos a iniciar una nueva conexi\u00f3n VPN y a autenticarse de nuevo. Un ataque continuo podr\u00eda impedir el establecimiento de nuevas conexiones VPN SSL, lo que har\u00eda que el servicio VPN Cisco AnyConnect no estuviera disponible para todos los usuarios leg\u00edtimos."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21495", "id": "CVE-2025-21495",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:14.367", "published": "2025-01-21T21:15:14.367",
"lastModified": "2025-01-23T17:15:22.903", "lastModified": "2025-06-23T18:09:07.213",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,44 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_enterprise_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "67F745C1-29A0-44A8-8BA8-DDBAD3CD15BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_enterprise_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "02DA6907-99B9-42EC-B338-B58323B96D96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_enterprise_firewall:9.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5B3569E-4453-4EAD-B3D8-54D0E9B71C60"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpujan2025.html", "url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21552", "id": "CVE-2025-21552",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:21.763", "published": "2025-01-21T21:15:21.763",
"lastModified": "2025-03-13T15:15:52.237", "lastModified": "2025-06-23T17:50:21.420",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.9.2",
"matchCriteriaId": "E99060DC-68AB-467B-B4D6-97BF0688FCB0"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpujan2025.html", "url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21553", "id": "CVE-2025-21553",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:21.880", "published": "2025-01-21T21:15:21.880",
"lastModified": "2025-02-04T16:15:41.797", "lastModified": "2025-06-23T17:49:50.830",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,46 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.3",
"versionEndIncluding": "19.25",
"matchCriteriaId": "47D141DE-6AC9-4FD5-8421-E2FC9AB9A87F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.3",
"versionEndIncluding": "21.16",
"matchCriteriaId": "77C2D127-57F1-45C5-9DBF-6014EAB6B801"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.4",
"versionEndIncluding": "23.6",
"matchCriteriaId": "42837C29-D768-4AAF-B7F8-69E8ED1AA1F3"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpujan2025.html", "url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21557", "id": "CVE-2025-21557",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.423", "published": "2025-01-21T21:15:22.423",
"lastModified": "2025-02-04T19:15:32.943", "lastModified": "2025-06-23T18:08:52.383",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,35 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "55D8B512-A82C-475B-91F8-953DB68D6716"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*",
"matchCriteriaId": "318CB2C2-CAD0-48BD-9892-5773D7B0339B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpujan2025.html", "url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21568", "id": "CVE-2025-21568",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.843", "published": "2025-01-21T21:15:23.843",
"lastModified": "2025-02-04T17:15:21.297", "lastModified": "2025-06-23T18:01:43.933",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,30 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hyperion_data_relationship_management:11.2.19.0.000:*:*:*:*:*:*:*",
"matchCriteriaId": "44D01719-77F9-4776-814D-B26C2C98988A"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpujan2025.html", "url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21569", "id": "CVE-2025-21569",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.977", "published": "2025-01-21T21:15:23.977",
"lastModified": "2025-02-04T17:15:21.423", "lastModified": "2025-06-23T18:01:24.330",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,30 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hyperion_data_relationship_management:11.2.19.0.000:*:*:*:*:*:*:*",
"matchCriteriaId": "44D01719-77F9-4776-814D-B26C2C98988A"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpujan2025.html", "url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21583", "id": "CVE-2025-21583",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-04-15T21:15:53.797", "published": "2025-04-15T21:15:53.797",
"lastModified": "2025-04-19T01:15:44.537", "lastModified": "2025-06-23T18:00:45.600",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,57 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12C89458-F0D4-4C87-9C97-E8D5319E73AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFEA6CB-D404-4759-B85F-3E3C130DEEDD"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20250418-0009/", "url": "https://security.netapp.com/advisory/ntap-20250418-0009/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2123", "id": "CVE-2025-2123",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T15:15:36.413", "published": "2025-03-09T15:15:36.413",
"lastModified": "2025-03-10T16:15:14.740", "lastModified": "2025-06-23T18:53:22.017",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 2.1, "exploitabilityScore": 2.1,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,36 +142,97 @@
"value": "CWE-94" "value": "CWE-94"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qbnz:geshi:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.9.1",
"matchCriteriaId": "F99A2A40-15A0-431B-BAE6-3AC3A5B3772B"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/GeSHi/geshi-1.0/issues/159", "url": "https://github.com/GeSHi/geshi-1.0/issues/159",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694", "url": "https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.299036", "url": "https://vuldb.com/?ctiid.299036",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.299036", "url": "https://vuldb.com/?id.299036",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.507418", "url": "https://vuldb.com/?submit.507418",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/GeSHi/geshi-1.0/issues/159", "url": "https://github.com/GeSHi/geshi-1.0/issues/159",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694", "url": "https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2148", "id": "CVE-2025-2148",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-10T12:15:12.617", "published": "2025-03-10T12:15:12.617",
"lastModified": "2025-03-10T14:15:26.130", "lastModified": "2025-06-23T18:47:34.860",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 1.6, "exploitabilityScore": 1.6,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -120,26 +140,61 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pytorch:pytorch:2.6.0\\+cu124:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC3454B-502D-4866-B812-D65D3B516549"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/pytorch/pytorch/issues/147722", "url": "https://github.com/pytorch/pytorch/issues/147722",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.299059", "url": "https://vuldb.com/?ctiid.299059",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.299059", "url": "https://vuldb.com/?id.299059",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.505959", "url": "https://vuldb.com/?submit.505959",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/pytorch/pytorch/issues/147722", "url": "https://github.com/pytorch/pytorch/issues/147722",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2149", "id": "CVE-2025-2149",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-10T13:15:36.290", "published": "2025-03-10T13:15:36.290",
"lastModified": "2025-03-10T14:15:26.267", "lastModified": "2025-06-23T18:44:57.017",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -120,34 +120,76 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pytorch:pytorch:2.6.0\\+cu124:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC3454B-502D-4866-B812-D65D3B516549"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/pytorch/pytorch/issues/147818", "url": "https://github.com/pytorch/pytorch/issues/147818",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}, },
{ {
"url": "https://github.com/pytorch/pytorch/issues/147818#issue-2877301660", "url": "https://github.com/pytorch/pytorch/issues/147818#issue-2877301660",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.299060", "url": "https://vuldb.com/?ctiid.299060",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.299060", "url": "https://vuldb.com/?id.299060",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.506563", "url": "https://vuldb.com/?submit.506563",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
}, },
{ {
"url": "https://github.com/pytorch/pytorch/issues/147818", "url": "https://github.com/pytorch/pytorch/issues/147818",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking"
]
}, },
{ {
"url": "https://github.com/pytorch/pytorch/issues/147818#issue-2877301660", "url": "https://github.com/pytorch/pytorch/issues/147818#issue-2877301660",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2171", "id": "CVE-2025-2171",
"sourceIdentifier": "mandiant-cve@google.com", "sourceIdentifier": "mandiant-cve@google.com",
"published": "2025-06-23T14:15:26.437", "published": "2025-06-23T14:15:26.437",
"lastModified": "2025-06-23T14:15:26.437", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -18,8 +18,8 @@
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "4.0", "version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.8, "baseScore": 7.8,
"baseSeverity": "HIGH", "baseSeverity": "HIGH",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
@ -32,7 +32,7 @@
"subConfidentialityImpact": "NONE", "subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE", "subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE", "subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED", "exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED", "confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED", "availabilityRequirement": "NOT_DEFINED",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2172", "id": "CVE-2025-2172",
"sourceIdentifier": "mandiant-cve@google.com", "sourceIdentifier": "mandiant-cve@google.com",
"published": "2025-06-23T14:15:26.607", "published": "2025-06-23T14:15:26.607",
"lastModified": "2025-06-23T14:15:26.607", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -18,9 +18,9 @@
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "4.0", "version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.5, "baseScore": 6.6,
"baseSeverity": "HIGH", "baseSeverity": "MEDIUM",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "HIGH", "attackComplexity": "HIGH",
"attackRequirements": "NONE", "attackRequirements": "NONE",
@ -32,7 +32,7 @@
"subConfidentialityImpact": "NONE", "subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE", "subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE", "subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED", "exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED", "confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED", "availabilityRequirement": "NOT_DEFINED",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23049", "id": "CVE-2025-23049",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T12:15:22.603", "published": "2025-06-23T12:15:22.603",
"lastModified": "2025-06-23T12:15:22.603", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-23092",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T21:15:24.460",
"lastModified": "2025-06-23T21:15:24.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mitel OpenScape Accounting Management through V5 R1.1.0 could allow an authenticated attacker with administrative privileges to conduct a path traversal attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to upload arbitrary files and execute unauthorized commands."
}
],
"metrics": {},
"references": [
{
"url": "https://www.mitel.com/support/mitel-product-security-advisory-misa-2025-0006",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23121", "id": "CVE-2025-23121",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.260", "published": "2025-06-19T00:15:21.260",
"lastModified": "2025-06-19T00:15:21.260", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.veeam.com/kb4743", "url": "https://www.veeam.com/kb4743",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23168", "id": "CVE-2025-23168",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.377", "published": "2025-06-19T00:15:21.377",
"lastModified": "2025-06-19T00:15:21.377", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/68526512dc94d6b9f2faf715", "url": "https://security-portal.versa-networks.com/emailbulletins/68526512dc94d6b9f2faf715",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23169", "id": "CVE-2025-23169",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.497", "published": "2025-06-19T00:15:21.497",
"lastModified": "2025-06-19T00:15:21.497", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716", "url": "https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23170", "id": "CVE-2025-23170",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.620", "published": "2025-06-19T00:15:21.620",
"lastModified": "2025-06-19T00:15:21.620", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/68526bc7dc94d6b9f2faf717", "url": "https://security-portal.versa-networks.com/emailbulletins/68526bc7dc94d6b9f2faf717",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23171", "id": "CVE-2025-23171",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.743", "published": "2025-06-19T00:15:21.743",
"lastModified": "2025-06-19T00:15:21.743", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/68526dbbdc94d6b9f2faf71a", "url": "https://security-portal.versa-networks.com/emailbulletins/68526dbbdc94d6b9f2faf71a",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23172", "id": "CVE-2025-23172",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.857", "published": "2025-06-19T00:15:21.857",
"lastModified": "2025-06-19T00:15:21.857", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/68526e7bdc94d6b9f2faf71b", "url": "https://security-portal.versa-networks.com/emailbulletins/68526e7bdc94d6b9f2faf71b",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23173", "id": "CVE-2025-23173",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:21.977", "published": "2025-06-19T00:15:21.977",
"lastModified": "2025-06-19T00:15:21.977", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/68526ee0dc94d6b9f2faf71c", "url": "https://security-portal.versa-networks.com/emailbulletins/68526ee0dc94d6b9f2faf71c",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24286", "id": "CVE-2025-24286",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:22.093", "published": "2025-06-19T00:15:22.093",
"lastModified": "2025-06-19T00:15:22.093", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.veeam.com/kb4743", "url": "https://www.veeam.com/kb4743",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24287", "id": "CVE-2025-24287",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:22.207", "published": "2025-06-19T00:15:22.207",
"lastModified": "2025-06-19T00:15:22.207", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.veeam.com/kb4743", "url": "https://www.veeam.com/kb4743",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24288", "id": "CVE-2025-24288",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:22.323", "published": "2025-06-19T00:15:22.323",
"lastModified": "2025-06-19T00:15:22.323", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/68526d12dc94d6b9f2faf719", "url": "https://security-portal.versa-networks.com/emailbulletins/68526d12dc94d6b9f2faf719",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24291", "id": "CVE-2025-24291",
"sourceIdentifier": "support@hackerone.com", "sourceIdentifier": "support@hackerone.com",
"published": "2025-06-19T00:15:22.437", "published": "2025-06-19T00:15:22.437",
"lastModified": "2025-06-19T00:15:22.437", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://security-portal.versa-networks.com/emailbulletins/68526fc6dc94d6b9f2faf71d", "url": "https://security-portal.versa-networks.com/emailbulletins/68526fc6dc94d6b9f2faf71d",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2443", "id": "CVE-2025-2443",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2025-06-20T18:15:28.270", "published": "2025-06-20T18:15:28.270",
"lastModified": "2025-06-20T18:15:28.270", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue has been discovered in GitLab EE that allows for cross-site-scripting attack and content security policy bypass in a user's browser under specific conditions, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1." "value": "An issue has been discovered in GitLab EE that allows for cross-site-scripting attack and content security policy bypass in a user's browser under specific conditions, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en GitLab EE que permite ataques de Cross-Site Scripting y eludir la pol\u00edtica de seguridad de contenido en el navegador de un usuario en condiciones espec\u00edficas, lo que afecta a todas las versiones desde la 16.6 hasta la 17.9.7, la 17.10 hasta la 17.10.5 y la 17.11 hasta la 17.11.1."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25034", "id": "CVE-2025-25034",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-20T19:15:35.693", "published": "2025-06-20T19:15:35.693",
"lastModified": "2025-06-20T19:15:35.693", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors." "value": "A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n de objetos PHP en versiones de SugarCRM anteriores a 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2 y 7.7.1.0 debido a una validaci\u00f3n incorrecta de la entrada serializada de PHP en el script SugarRestSerialize.php. El c\u00f3digo vulnerable no depura el par\u00e1metro rest_data antes de pasarlo a la funci\u00f3n unserialize(). Esto permite que un atacante no autenticado env\u00ede datos serializados manipulados que contienen declaraciones de objetos maliciosos, lo que provoca la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto de la aplicaci\u00f3n. Aunque SugarCRM public\u00f3 una correcci\u00f3n previa en el aviso sugarcrm-sa-2016-001, el parche estaba incompleto y no solucionaba algunos vectores."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25037", "id": "CVE-2025-25037",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-20T19:15:35.870", "published": "2025-06-20T19:15:35.870",
"lastModified": "2025-06-20T19:15:35.870", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An information disclosure vulnerability exists in Aquatronica Controller System firmware versions <= 5.1.6 and web interface versions <= 2.0. The tcp.php endpoint fails to restrict unauthenticated access, allowing remote attackers to issue crafted POST requests and retrieve sensitive configuration data, including plaintext administrative credentials. Exploitation of this flaw can lead to full compromise of the system, enabling unauthorized manipulation of connected devices and aquarium parameters." "value": "An information disclosure vulnerability exists in Aquatronica Controller System firmware versions <= 5.1.6 and web interface versions <= 2.0. The tcp.php endpoint fails to restrict unauthenticated access, allowing remote attackers to issue crafted POST requests and retrieve sensitive configuration data, including plaintext administrative credentials. Exploitation of this flaw can lead to full compromise of the system, enabling unauthorized manipulation of connected devices and aquarium parameters."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en las versiones de firmware de Aquatronica Controller System anteriores a la 5.1.6 y anteriores a la 2.0 de la interfaz web. El endpoint tcp.php no restringe el acceso no autenticado, lo que permite a atacantes remotos emitir solicitudes POST manipuladas y recuperar datos de configuraci\u00f3n confidenciales, incluyendo credenciales administrativas en texto plano. La explotaci\u00f3n de esta vulnerabilidad puede comprometer por completo el sistema, lo que permite la manipulaci\u00f3n no autorizada de los dispositivos conectados y los par\u00e1metros del acuario."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25038", "id": "CVE-2025-25038",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-20T19:15:36.050", "published": "2025-06-20T19:15:36.050",
"lastModified": "2025-06-20T19:15:36.050", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An OS command injection vulnerability exists in MiniDVBLinux version 5.4 and earlier. The system\u2019s web-based management interface fails to properly sanitize user-supplied input before passing it to operating system commands. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary commands as the root user, potentially compromising the entire device." "value": "An OS command injection vulnerability exists in MiniDVBLinux version 5.4 and earlier. The system\u2019s web-based management interface fails to properly sanitize user-supplied input before passing it to operating system commands. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary commands as the root user, potentially compromising the entire device."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el sistema operativo MiniDVBLinux versi\u00f3n 5.4 y anteriores. La interfaz de administraci\u00f3n web del sistema no depura correctamente la entrada del usuario antes de pasarla a los comandos del sistema operativo. Un atacante remoto no autenticado puede explotar esta vulnerabilidad para ejecutar comandos arbitrarios como usuario root, lo que podr\u00eda comprometer todo el dispositivo."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25382", "id": "CVE-2025-25382",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T16:15:13.393", "published": "2025-03-10T16:15:13.393",
"lastModified": "2025-03-20T21:15:23.030", "lastModified": "2025-06-23T19:49:27.087",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,18 +51,44 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ikm:sanchaya:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4C908E95-A0C1-435D-A8E0-FA81F33A8888"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md", "url": "https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://tax.lsgkerala.gov.in/epayment/QuickPaySearch.php", "url": "https://tax.lsgkerala.gov.in/epayment/QuickPaySearch.php",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md", "url": "https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25614", "id": "CVE-2025-25614",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T15:15:37.330", "published": "2025-03-10T15:15:37.330",
"lastModified": "2025-03-10T20:15:14.280", "lastModified": "2025-06-23T18:35:25.673",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,18 +51,46 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changeweb:unifiedtransform:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "883EFC82-98B6-4094-8472-3A520B2F0196"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/armaansidana2003/CVE-2025-25614", "url": "https://github.com/armaansidana2003/CVE-2025-25614",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit"
]
}, },
{ {
"url": "https://github.com/changeweb/Unifiedtransform", "url": "https://github.com/changeweb/Unifiedtransform",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/armaansidana2003/CVE-2025-25614", "url": "https://github.com/armaansidana2003/CVE-2025-25614",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory",
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25620", "id": "CVE-2025-25620",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T15:15:37.490", "published": "2025-03-10T15:15:37.490",
"lastModified": "2025-03-10T19:15:40.393", "lastModified": "2025-06-23T19:47:00.840",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,37 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changeweb:unifiedtransform:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "883EFC82-98B6-4094-8472-3A520B2F0196"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/armaansidana2003/CVE-2025-25620", "url": "https://github.com/armaansidana2003/CVE-2025-25620",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/changeweb/Unifiedtransform", "url": "https://github.com/changeweb/Unifiedtransform",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25908", "id": "CVE-2025-25908",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T22:15:27.150", "published": "2025-03-10T22:15:27.150",
"lastModified": "2025-03-11T03:15:39.350", "lastModified": "2025-06-23T20:13:31.600",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,30 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tianti_project:tianti:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "15BA6CED-60CB-45A5-8BE2-4FE8EF3F8C04"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/xujeff/tianti/issues/40", "url": "https://github.com/xujeff/tianti/issues/40",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25940", "id": "CVE-2025-25940",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T16:15:13.520", "published": "2025-03-10T16:15:13.520",
"lastModified": "2025-03-12T19:15:39.967", "lastModified": "2025-06-23T20:05:39.933",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,18 +51,46 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:visicut:visicut:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F8D48DD-9FFD-430E-AE40-BBD22CA1081D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/t-oster/VisiCut", "url": "https://github.com/t-oster/VisiCut",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://royblume.github.io/CVE-2025-25940/", "url": "https://royblume.github.io/CVE-2025-25940/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://royblume.github.io/CVE-2025-25940/", "url": "https://royblume.github.io/CVE-2025-25940/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26198", "id": "CVE-2025-26198",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-18T18:15:24.097", "published": "2025-06-18T18:15:24.097",
"lastModified": "2025-06-20T16:15:28.057", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26199", "id": "CVE-2025-26199",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-18T20:15:19.667", "published": "2025-06-18T20:15:19.667",
"lastModified": "2025-06-20T16:15:28.217", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26413", "id": "CVE-2025-26413",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2025-04-22T08:15:28.853", "published": "2025-04-22T08:15:28.853",
"lastModified": "2025-05-12T16:15:23.023", "lastModified": "2025-06-23T19:25:25.167",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,16 +49,52 @@
"value": "CWE-20" "value": "CWE-20"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kvrocks:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.12.0",
"matchCriteriaId": "0866BE6A-705F-4AD3-A6A3-8D4D5FC21ADA"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://lists.apache.org/thread/388743qrr8yq8qm0go8tls6rf1kog8dw", "url": "https://lists.apache.org/thread/388743qrr8yq8qm0go8tls6rf1kog8dw",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2025/04/22/1", "url": "http://www.openwall.com/lists/oss-security/2025/04/22/1",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26865", "id": "CVE-2025-26865",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2025-03-10T14:15:25.220", "published": "2025-03-10T14:15:25.220",
"lastModified": "2025-03-11T20:15:17.917", "lastModified": "2025-06-23T18:37:09.027",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,26 +51,61 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:ofbiz:18.12.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C07CBDF9-F52E-4C71-BDA4-F431FE8F24F0"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://issues.apache.org/jira/browse/OFBIZ-12594", "url": "https://issues.apache.org/jira/browse/OFBIZ-12594",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Issue Tracking",
"Patch"
]
}, },
{ {
"url": "https://lists.apache.org/thread/prb48ztk01bflyyjbl6p56wlcc1n5sz7", "url": "https://lists.apache.org/thread/prb48ztk01bflyyjbl6p56wlcc1n5sz7",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "https://ofbiz.apache.org/download.html", "url": "https://ofbiz.apache.org/download.html",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://ofbiz.apache.org/security.html", "url": "https://ofbiz.apache.org/security.html",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2025/03/07/1", "url": "http://www.openwall.com/lists/oss-security/2025/03/07/1",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27190", "id": "CVE-2025-27190",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T21:15:50.727", "published": "2025-04-08T21:15:50.727",
"lastModified": "2025-04-09T20:02:41.860", "lastModified": "2025-06-23T19:30:03.177",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,585 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
"matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*",
"matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*",
"matchCriteriaId": "D9D01159-3309-4F6B-93B0-2D89DDD33DEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
"matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
"matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
"matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
"matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
"matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
"matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*",
"matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*",
"matchCriteriaId": "E82D10D8-2894-4E5B-B47B-F00964DD5CDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
"matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
"matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
"matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
"matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
"matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
"matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
"matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
"matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
"matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
"matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
"matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
"matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
"matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
"matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*",
"matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*",
"matchCriteriaId": "73D22D42-646D-4955-A6F9-9B7BA63DC0A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
"matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
"matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
"matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*",
"matchCriteriaId": "7771BEDB-05E2-430E-B2A2-E2F7574B7114"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
"matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
"matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*",
"matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*",
"matchCriteriaId": "83FD1220-7D46-42B2-8110-30A934144572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta2:*:*:*:*:*:*",
"matchCriteriaId": "C9E12B43-AD3E-48A2-9042-5586186CA3BE"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
"matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
"matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*",
"matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*",
"matchCriteriaId": "491AB715-F62A-46DB-A56E-055CF7CB7BEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
"matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*",
"matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*",
"matchCriteriaId": "0E5ACABA-D6D6-4F29-A9DD-5A04A44ABE64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:*",
"matchCriteriaId": "FA80AFCE-2663-46C0-AEC0-C16C8E675E6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
"matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
"matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:*",
"matchCriteriaId": "A4BE67D7-6463-4179-8C68-298CF960DBC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
"matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*",
"matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*",
"matchCriteriaId": "45090787-93BF-4683-B1E2-7D12FB18BEED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
"matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
"matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*",
"matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*",
"matchCriteriaId": "E14195F1-5016-46BE-A614-6FB4E312FC93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.1:-:*:*:*:*:*:*",
"matchCriteriaId": "C7F81CCF-0105-465B-90A3-047A57ED4B81"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*",
"matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*",
"matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*",
"matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*",
"matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p12:*:*:open_source:*:*:*",
"matchCriteriaId": "42A23BF0-164F-4342-ADF5-B439B902503E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*",
"matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*",
"matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*",
"matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*",
"matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*",
"matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*",
"matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*",
"matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*",
"matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
"matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
"matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*",
"matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*",
"matchCriteriaId": "08B7898F-E25A-4D16-A007-6D4543E80C58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
"matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
"matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
"matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
"matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
"matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
"matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
"matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
"matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
"matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
"matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
"matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
"matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
"matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
"matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
"matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
"matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*",
"matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*",
"matchCriteriaId": "A91E797D-63F6-4DE8-869C-AF0133DC6C03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
"matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
"matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
"matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*",
"matchCriteriaId": "7EB4B9C5-513C-4039-8087-5E8880894318"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
"matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*",
"matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*",
"matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*",
"matchCriteriaId": "9830E074-FDCF-41E9-98C7-10C20424EF4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta2:*:*:open_source:*:*:*",
"matchCriteriaId": "2957B390-52C5-48D7-A6D7-709BC76B9C69"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html", "url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html",
"source": "psirt@adobe.com" "source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27206", "id": "CVE-2025-27206",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T16:15:36.273", "published": "2025-06-10T16:15:36.273",
"lastModified": "2025-06-12T16:06:39.330", "lastModified": "2025-06-23T19:25:38.097",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,565 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
"matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*",
"matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*",
"matchCriteriaId": "D9D01159-3309-4F6B-93B0-2D89DDD33DEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p13:*:*:*:*:*:*",
"matchCriteriaId": "91736E79-D8E7-4AF2-8E01-A7B4EB8AD6F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
"matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
"matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
"matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
"matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
"matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
"matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*",
"matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*",
"matchCriteriaId": "E82D10D8-2894-4E5B-B47B-F00964DD5CDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p12:*:*:*:*:*:*",
"matchCriteriaId": "B044F2D9-E888-4852-8A40-DCE688860ED3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
"matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
"matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
"matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
"matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
"matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
"matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
"matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
"matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p10:*:*:*:*:*:*",
"matchCriteriaId": "E57889CC-3E90-46AF-9CD6-3328DD501AD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
"matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
"matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
"matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
"matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
"matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
"matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*",
"matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*",
"matchCriteriaId": "73D22D42-646D-4955-A6F9-9B7BA63DC0A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
"matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
"matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
"matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*",
"matchCriteriaId": "7771BEDB-05E2-430E-B2A2-E2F7574B7114"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
"matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
"matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*",
"matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*",
"matchCriteriaId": "83FD1220-7D46-42B2-8110-30A934144572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p5:*:*:*:*:*:*",
"matchCriteriaId": "3F1439CE-8A3B-414A-B974-559209FF480C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce:2.4.8:-:*:*:*:*:*:*",
"matchCriteriaId": "1EE12F4B-5607-4790-A29B-EE23383BCC1A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
"matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
"matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*",
"matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*",
"matchCriteriaId": "491AB715-F62A-46DB-A56E-055CF7CB7BEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p13:*:*:*:*:*:*",
"matchCriteriaId": "6FE364A8-4780-426F-9E8A-284A31FE2623"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
"matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*",
"matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*",
"matchCriteriaId": "0E5ACABA-D6D6-4F29-A9DD-5A04A44ABE64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:*",
"matchCriteriaId": "FA80AFCE-2663-46C0-AEC0-C16C8E675E6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
"matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
"matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:*",
"matchCriteriaId": "A4BE67D7-6463-4179-8C68-298CF960DBC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
"matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*",
"matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*",
"matchCriteriaId": "45090787-93BF-4683-B1E2-7D12FB18BEED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
"matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
"matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*",
"matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*",
"matchCriteriaId": "E14195F1-5016-46BE-A614-6FB4E312FC93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p5:*:*:*:*:*:*",
"matchCriteriaId": "9C360EA8-B18F-4327-90EF-7EED2892BE4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.2:-:*:*:*:*:*:*",
"matchCriteriaId": "D855D141-7876-4F5A-91BE-6350DD379879"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
"matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
"matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*",
"matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*",
"matchCriteriaId": "08B7898F-E25A-4D16-A007-6D4543E80C58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p12:*:*:open_source:*:*:*",
"matchCriteriaId": "313CB0C1-2E8C-46AC-B72B-AFA9E0A6E064"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
"matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
"matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
"matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
"matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
"matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
"matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
"matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
"matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
"matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
"matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p10:*:*:open_source:*:*:*",
"matchCriteriaId": "AE842CC8-7795-4238-B727-0BA2FFFBF62C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
"matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
"matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
"matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
"matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
"matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
"matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*",
"matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*",
"matchCriteriaId": "A91E797D-63F6-4DE8-869C-AF0133DC6C03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
"matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
"matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
"matchCriteriaId": "FBCFE5FB-FAB7-4BF0-90AE-79F9590FD872"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*",
"matchCriteriaId": "7EB4B9C5-513C-4039-8087-5E8880894318"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
"matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*",
"matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*",
"matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*",
"matchCriteriaId": "9830E074-FDCF-41E9-98C7-10C20424EF4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.7:p5:*:*:open_source:*:*:*",
"matchCriteriaId": "9D0C8648-B39E-47C7-AA5C-3AFED22F8D40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:magento:2.4.8:-:*:*:open_source:*:*:*",
"matchCriteriaId": "00E8284F-10CD-449C-AEF1-688B8287292F"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html", "url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html",
"source": "psirt@adobe.com" "source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27387", "id": "CVE-2025-27387",
"sourceIdentifier": "security@oppo.com", "sourceIdentifier": "security@oppo.com",
"published": "2025-06-23T10:15:27.100", "published": "2025-06-23T10:15:27.100",
"lastModified": "2025-06-23T10:15:27.100", "lastModified": "2025-06-23T20:16:21.633",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27636", "id": "CVE-2025-27636",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2025-03-09T13:15:34.403", "published": "2025-03-09T13:15:34.403",
"lastModified": "2025-03-17T15:15:44.750", "lastModified": "2025-06-23T18:54:52.400",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,30 +51,84 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10.0",
"versionEndExcluding": "3.22.4",
"matchCriteriaId": "F955C7FA-20EE-44FC-BB7F-2734A731A9DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.8.0",
"versionEndExcluding": "4.8.5",
"matchCriteriaId": "15914F75-761B-40AD-8489-EA92699F3741"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10.0",
"versionEndExcluding": "4.10.2",
"matchCriteriaId": "DB496A7D-7E5D-48DA-B49F-4494B7369026"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://camel.apache.org/security/CVE-2025-27636.html", "url": "https://camel.apache.org/security/CVE-2025-27636.html",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://issues.apache.org/jira/browse/CAMEL-21828", "url": "https://issues.apache.org/jira/browse/CAMEL-21828",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Issue Tracking",
"Patch"
]
}, },
{ {
"url": "https://lists.apache.org/thread/l3zcg3vts88bmc7w8172wkgw610y693z", "url": "https://lists.apache.org/thread/l3zcg3vts88bmc7w8172wkgw610y693z",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2025/03/09/1", "url": "http://www.openwall.com/lists/oss-security/2025/03/09/1",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://camel.apache.org/security/CVE-2025-27636.txt.asc", "url": "https://camel.apache.org/security/CVE-2025-27636.txt.asc",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC/blob/main/src/main/java/com/example/camel/VulnerableCamel.java", "url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC/blob/main/src/main/java/com/example/camel/VulnerableCamel.java",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27893", "id": "CVE-2025-27893",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T09:15:25.457", "published": "2025-03-11T09:15:25.457",
"lastModified": "2025-03-11T14:15:26.033", "lastModified": "2025-06-23T20:15:18.907",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 0.4, "exploitabilityScore": 0.4,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
} }
] ]
}, },
@ -51,18 +71,48 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0.0",
"versionEndIncluding": "6.14.00202.10024",
"matchCriteriaId": "0C3617CA-3593-4E00-AFAF-A40F4877267E"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://archerirm.com", "url": "https://archerirm.com",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/NastyCrow/CVE-2025-27893", "url": "https://github.com/NastyCrow/CVE-2025-27893",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/NastyCrow/CVE-2025-27893", "url": "https://github.com/NastyCrow/CVE-2025-27893",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28056", "id": "CVE-2025-28056",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-13T16:15:29.053", "published": "2025-05-13T16:15:29.053",
"lastModified": "2025-05-14T14:15:28.580", "lastModified": "2025-06-23T18:07:03.310",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,40 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruifang-tech:rebuild:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndIncluding": "3.9.3",
"matchCriteriaId": "E0AA960E-EB6C-484D-9CC3-28989E3E7F28"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/LTLTLXEY/c34dc785fc24f4cbb026e2ef3d7660c4", "url": "https://gist.github.com/LTLTLXEY/c34dc785fc24f4cbb026e2ef3d7660c4",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/getrebuild/rebuild/issues/866", "url": "https://github.com/getrebuild/rebuild/issues/866",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28197", "id": "CVE-2025-28197",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-18T20:15:16.450", "published": "2025-04-18T20:15:16.450",
"lastModified": "2025-04-22T14:15:25.370", "lastModified": "2025-06-23T19:49:56.080",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kidocode:crawl4ai:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.4.247",
"matchCriteriaId": "02C4B440-754A-4436-ACC0-E2EAA9A99BB4"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/AndrewDzzz/f49e79b09ce0643ee1fc2a829e8875e0", "url": "https://gist.github.com/AndrewDzzz/f49e79b09ce0643ee1fc2a829e8875e0",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-2828",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-06-23T21:15:25.210",
"lastModified": "2025-06-23T21:15:25.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit component of the langchain-community package (specifically, langchain_community.agent_toolkits.openapi.toolkit.RequestsToolkit) in langchain-ai/langchain version 0.0.27. This vulnerability occurs because the toolkit does not enforce restrictions on requests to remote internet addresses, allowing it to also access local addresses. As a result, an attacker could exploit this flaw to perform port scans, access local services, retrieve instance metadata from cloud environments (e.g., Azure, AWS), and interact with servers on the local network. This issue has been fixed in version 0.0.28."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/langchain-ai/langchain/commit/e188d4ecb085d4561a0be3c583d26aa9c2c3283f",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/8f771040-7f34-420a-b96b-5b93d4a99afc",
"source": "security@huntr.dev"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29547", "id": "CVE-2025-29547",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T15:16:12.447", "published": "2025-04-22T15:16:12.447",
"lastModified": "2025-04-23T14:08:13.383", "lastModified": "2025-06-23T18:23:41.120",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horizondatasys:rollback_rx_pro:12.8.0.0:*:*:*:professional:*:*:*",
"matchCriteriaId": "2E0BA57B-E5DE-4D6E-A619-6B62F9C15DCC"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://horizondatasys.com/rollback-rx-time-machine/rollback-rx-professional/", "url": "https://horizondatasys.com/rollback-rx-time-machine/rollback-rx-professional/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://packetstorm.news/files/id/190491/", "url": "https://packetstorm.news/files/id/190491/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29646", "id": "CVE-2025-29646",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-18T18:15:24.447", "published": "2025-06-18T18:15:24.447",
"lastModified": "2025-06-20T13:15:19.197", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30691", "id": "CVE-2025-30691",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-04-15T21:15:58.360", "published": "2025-04-15T21:15:58.360",
"lastModified": "2025-04-19T01:15:44.850", "lastModified": "2025-06-23T17:54:13.107",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,89 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CA3EFE25-C32C-4C77-9322-FAC4890BFA56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:24:*:*:*:*:*:*:*",
"matchCriteriaId": "1079F3AD-4178-44D9-92E9-C491DE07CD05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:21.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2158B240-CEE8-4A42-8D77-79215BB94924"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:24:*:*:*:*:*:*:*",
"matchCriteriaId": "137F81E6-12BD-423B-9865-FB33D770337C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:21.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "39D7BAAF-CC85-4180-AC4B-40B26B876B3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:24:*:*:*:*:*:*:*",
"matchCriteriaId": "20E49340-B272-4BDE-AB0D-ECE7F5133B11"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20250418-0004/", "url": "https://security.netapp.com/advisory/ntap-20250418-0004/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30721", "id": "CVE-2025-30721",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-04-15T21:16:01.760", "published": "2025-04-15T21:16:01.760",
"lastModified": "2025-04-16T13:25:37.340", "lastModified": "2025-06-23T17:54:26.630",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,10 +39,58 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.41",
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.4",
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.2.0",
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31698", "id": "CVE-2025-31698",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2025-06-19T10:15:20.980", "published": "2025-06-19T10:15:20.980",
"lastModified": "2025-06-20T14:15:27.420", "lastModified": "2025-06-23T20:16:59.783",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-32753", "id": "CVE-2025-32753",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2025-06-20T14:15:27.593", "published": "2025-06-20T14:15:27.593",
"lastModified": "2025-06-20T14:15:27.593", "lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.1, contains an improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service, information disclosure, and information tampering." "value": "Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.1, contains an improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service, information disclosure, and information tampering."
},
{
"lang": "es",
"value": "Dell PowerScale OneFS, versiones 9.5.0.0 a 9.10.0.1, presenta una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL (inyecci\u00f3n SQL). Un atacante con privilegios reducidos y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda denegaci\u00f3n de servicio, divulgaci\u00f3n y manipulaci\u00f3n de informaci\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32875", "id": "CVE-2025-32875",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-20T14:15:27.730", "published": "2025-06-20T14:15:27.730",
"lastModified": "2025-06-23T15:15:27.400", "lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-32876", "id": "CVE-2025-32876",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-06-20T14:15:27.877", "published": "2025-06-20T14:15:27.877",
"lastModified": "2025-06-20T14:15:27.877", "lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication." "value": "An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los dispositivos COROS PACE 3 hasta la versi\u00f3n 3.0808.0. La implementaci\u00f3n BLE del reloj inteligente COROS no es compatible con las conexiones seguras LE y, en su lugar, aplica el emparejamiento heredado BLE. En el emparejamiento heredado BLE, la clave de corto plazo (STK) se puede adivinar f\u00e1cilmente. Esto requiere conocer la clave temporal (TK), que, en el caso del COROS Pace 3, est\u00e1 configurada a 0 debido al m\u00e9todo de emparejamiento Just Works. Por lo tanto, un atacante dentro del alcance de Bluetooth puede realizar ataques de rastreo, lo que permite interceptar la comunicaci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {},

Some files were not shown because too many files have changed in this diff Show More