mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2025-06-26T18:00:18.817510+00:00
This commit is contained in:
parent
d9937e5827
commit
2a2a2ecd7b
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2010-5305",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2019-03-26T18:29:00.263",
|
||||
"lastModified": "2025-04-14T22:15:15.097",
|
||||
"lastModified": "2025-06-26T17:15:28.510",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -159,13 +159,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/66684/kw/vulnerability/r_id/115100",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-10-070-02",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-6535",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2019-02-05T19:29:00.243",
|
||||
"lastModified": "2024-11-21T04:46:38.847",
|
||||
"lastModified": "2025-06-26T17:15:29.873",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
@ -602,12 +622,8 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-029-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/106771",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2023-47029",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T18:15:20.630",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"lastModified": "2025-06-26T16:15:24.467",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via a crafted POST request to the UserService component"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en NCR Terminal Handler v.1.5.1 permite que un atacante remoto ejecute c\u00f3digo arbitrario y obtenga informaci\u00f3n confidencial a trav\u00e9s de una solicitud POST manipulada para el componente UserService."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1oX5uKnWGiYMaBxnBuqPiOA53XLxv1Ef4/view?usp=sharing",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2023-47294",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T16:15:24.493",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"lastModified": "2025-06-26T16:15:25.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in NCR Terminal Handler v1.5.1 allows low-level privileged authenticated attackers to arbitrarily deactivate, lock, and delete user accounts via a crafted session cookie."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en NCR Terminal Handler v1.5.1 permite que atacantes autenticados con privilegios de bajo nivel desactiven, bloqueen y eliminen arbitrariamente cuentas de usuario a trav\u00e9s de una cookie de sesi\u00f3n manipulada espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1owG3_2oVpoCb34Mb7nCYZNrjW8cFxpzN/view?usp=sharing",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2023-50450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T16:15:24.743",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"lastModified": "2025-06-26T16:15:25.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Sensopart VISOR Vision Sensors before 2.10.0.2 allows local users to perform unspecified actions with elevated privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Sensopart VISOR Vision Sensors anteriores a 2.10.0.2 que permit\u00eda a los usuarios locales realizar acciones no especificadas con privilegios elevados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
|
48
CVE-2024/CVE-2024-529xx/CVE-2024-52928.json
Normal file
48
CVE-2024/CVE-2024-529xx/CVE-2024-52928.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-52928",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-26T17:15:30.287",
|
||||
"lastModified": "2025-06-26T17:15:30.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with previously granted permissions) to add new permissions when the user clicks anywhere on the website."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://arc.net/security/bulletins#windows-site-settings-bypass-cve-2024-52928",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://thebrowser.company",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56915",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-26T15:15:22.570",
|
||||
"lastModified": "2025-06-26T15:15:22.570",
|
||||
"lastModified": "2025-06-26T16:15:25.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Netbox Community v4.1.7 and fixed in v.4.2.2 is vulnerable to Cross Site Scripting (XSS) via the RSS feed widget."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27587",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-16T22:15:44.093",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"lastModified": "2025-06-26T17:15:30.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "OpenSSL 3.0.0 a 3.3.2 en la arquitectura PowerPC es vulnerable a un ataque Minerva. Este ataque se puede explotar midiendo el tiempo de firma de mensajes aleatorios mediante la API EVP_DigestSign y, posteriormente, utilizando la clave privada para extraer el valor K (nonce) de las firmas. A continuaci\u00f3n, bas\u00e1ndose en el tama\u00f1o en bits del nonce extra\u00eddo, se puede comparar el tiempo de firma de nonces de tama\u00f1o completo con el de firmas que utilizan nonces m\u00e1s peque\u00f1os mediante pruebas estad\u00edsticas. Existe un canal lateral en la curva P-364 que permite la extracci\u00f3n de la clave privada (adem\u00e1s, existe una dependencia entre el tama\u00f1o en bits de K y el tama\u00f1o del canal lateral). NOTA: Esta CVE es controvertida porque la pol\u00edtica de seguridad de OpenSSL indica expl\u00edcitamente que cualquier canal lateral que requiera la detecci\u00f3n del mismo sistema f\u00edsico queda fuera del modelo de amenazas del software. La se\u00f1al de tiempo es tan peque\u00f1a que es imposible detectarla sin que el proceso atacante se ejecute en el mismo sistema f\u00edsico."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-385"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openssl/openssl/issues/24253",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29331",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-26T15:15:22.690",
|
||||
"lastModified": "2025-06-26T15:15:22.690",
|
||||
"lastModified": "2025-06-26T16:15:26.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in MHSanaei 3x-ui before v.2.5.3 and before allows a remote attacker to execute arbitrary code via the management script x-ui passes the no check certificate option to wget when downloading updates"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MHSanaei/3x-ui/pull/2661",
|
||||
|
25
CVE-2025/CVE-2025-301xx/CVE-2025-30131.json
Normal file
25
CVE-2025/CVE-2025-301xx/CVE-2025-30131.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-30131",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-26T17:15:30.743",
|
||||
"lastModified": "2025-06-26T17:15:30.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on IROAD Dashcam FX2 devices. An unauthenticated file upload endpoint can be leveraged to execute arbitrary commands by uploading a CGI-based webshell. Once a file is uploaded, the attacker can execute commands with root privileges, gaining full control over the dashcam. Additionally, by uploading a netcat (nc) binary, the attacker can establish a reverse shell, maintaining persistent remote and privileged access to the device. This allows complete device takeover."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-11---cve-2025-30131-unrestricted-webshell",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.iroadau.com.au/downloads/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
106
CVE-2025/CVE-2025-340xx/CVE-2025-34042.json
Normal file
106
CVE-2025/CVE-2025-340xx/CVE-2025-34042.json
Normal file
@ -0,0 +1,106 @@
|
||||
{
|
||||
"id": "CVE-2025-34042",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-26T16:15:27.197",
|
||||
"lastModified": "2025-06-26T16:15:27.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated command injection vulnerability exists in the Beward N100 IP Camera firmware version M2.1.6.04C014 via the ServerName and TimeZone parameters in the servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands into these parameters, which are unsafely embedded into backend system calls without proper input sanitization. Successful exploitation results in remote code execution with root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cxsecurity.com/issue/WLB-2019020042",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/151531",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://s4e.io/tools/beward-n100-h264-vga-ip-camera-arbitrary-file-disclosure",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/beward-n100-remote-command-execution",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.beward.net",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.fortiguard.com/encyclopedia/ips/48618",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5512.php",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
102
CVE-2025/CVE-2025-340xx/CVE-2025-34043.json
Normal file
102
CVE-2025/CVE-2025-340xx/CVE-2025-34043.json
Normal file
@ -0,0 +1,102 @@
|
||||
{
|
||||
"id": "CVE-2025-34043",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-26T16:15:27.490",
|
||||
"lastModified": "2025-06-26T16:15:27.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A remote command injection vulnerability exists in Vacron Network Video Recorder (NVR) devices v1.4 due to improper input sanitization in the board.cgi script. The vulnerability allows unauthenticated attackers to pass arbitrary commands to the underlying operating system via crafted HTTP requests. These commands are executed with the privileges of the web server process, enabling remote code execution and potential full device compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/vacron-nvr-remote-command-execution",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=30386",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sonicwall.com/blog/vacron-network-video-recorder-remote-command-execution",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenable.com/plugins/nessus/104124",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vacron.com/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
102
CVE-2025/CVE-2025-340xx/CVE-2025-34044.json
Normal file
102
CVE-2025/CVE-2025-340xx/CVE-2025-34044.json
Normal file
@ -0,0 +1,102 @@
|
||||
{
|
||||
"id": "CVE-2025-34044",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-26T16:15:27.670",
|
||||
"lastModified": "2025-06-26T16:15:27.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A remote command injection vulnerability exists in the confirm.php interface of the WIFISKY 7-layer Flow Control Router via a specially-crafted HTTP GET request to the t parameter. Insufficient input validation allows unauthenticated attackers to execute arbitrary OS commands."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.szwifisky.com/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/other/wifisky7-rce.yaml",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/wifisky-flow-control-router-rce",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-45363",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.variotdbs.pl/vuln/VAR-202107-1715/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-340xx/CVE-2025-34045.json
Normal file
94
CVE-2025/CVE-2025-340xx/CVE-2025-34045.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-34045",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-26T16:15:27.830",
|
||||
"lastModified": "2025-06-26T16:15:27.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2020/CNVD-2020-68596.yaml",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/weiphp-path-traversal-file-read",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2020-68596",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-340xx/CVE-2025-34046.json
Normal file
94
CVE-2025/CVE-2025-340xx/CVE-2025-34046.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-34046",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-26T16:15:27.987",
|
||||
"lastModified": "2025-06-26T16:15:27.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated file upload vulnerability exists in the Fanwei E-Office <= v9.4 web management interface. The vulnerability affects the /general/index/UploadFile.php endpoint, which improperly validates uploaded files when invoked with certain parameters (uploadType=eoffice_logo or uploadType=theme). An attacker can exploit this flaw by sending a crafted HTTP POST request to upload arbitrary files without requiring authentication. Successful exploitation could enable remote code execution on the affected server, leading to complete compromise of the web application and potentially the underlying system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/M0ge/CNVD-2021-49104-Fanwei-Eoffice-fileupload/blob/main/eoffice_fileupload.py",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2021/CNVD-2021-49104.yaml",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/fanwei-eoffice-file-upload",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-49104",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-340xx/CVE-2025-34047.json
Normal file
94
CVE-2025/CVE-2025-340xx/CVE-2025-34047.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-34047",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-26T16:15:28.140",
|
||||
"lastModified": "2025-06-26T16:15:28.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability exists in the Leadsec SSL VPN (formerly Lenovo NetGuard), allowing unauthenticated attackers to read arbitrary files on the underlying system via the ostype parameter in the /vpn/user/download/client endpoint. This flaw arises from insufficient input sanitation, enabling traversal sequences\u00a0to escape the intended directory and access sensitive files."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2021/CNVD-2021-64035.yaml",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/leadsec-vpn-path-traversal-file-read",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-64035",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.leadsec.com.cn/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-340xx/CVE-2025-34048.json
Normal file
94
CVE-2025/CVE-2025-340xx/CVE-2025-34048.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-34048",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-26T16:15:28.273",
|
||||
"lastModified": "2025-06-26T16:15:28.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/threat9/routersploit/blob/master/routersploit/modules/exploits/routers/dlink/dsl_2730_2750_path_traversal.py",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/dlink-dsl-routers-path-traversal-file-read",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/40735",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-340xx/CVE-2025-34049.json
Normal file
90
CVE-2025/CVE-2025-340xx/CVE-2025-34049.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-34049",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-26T16:15:28.413",
|
||||
"lastModified": "2025-06-26T16:15:28.413",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability exists in the OptiLink ONT1GEW GPON router firmware version V2.1.11_X101 Build 1127.190306 and earlier. The router\u2019s web management interface fails to properly sanitize user input in the target_addr parameter of the formTracert and formPing administrative endpoints. An authenticated attacker can inject arbitrary operating system commands, which are executed with root privileges, leading to remote code execution. Successful exploitation enables full compromise of the device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://optilinknetwork.com/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/optilink-ont1gew-router-rce",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/49955",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-360xx/CVE-2025-36034.json
Normal file
56
CVE-2025/CVE-2025-360xx/CVE-2025-36034.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-36034",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-06-26T16:15:28.567",
|
||||
"lastModified": "2025-06-26T16:15:28.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7237604",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-441xx/CVE-2025-44141.json
Normal file
25
CVE-2025/CVE-2025-441xx/CVE-2025-44141.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-44141",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-26T16:15:28.753",
|
||||
"lastModified": "2025-06-26T16:15:28.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Scripting (XSS) vulnerability exists in the node creation form of Backdrop CMS 1.30."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://backdrop.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://scandalous-author-611.notion.site/CVE-2025-44141-21d29577f39e802480a2efab13e66c61",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-45526",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-17T20:15:32.243",
|
||||
"lastModified": "2025-06-18T19:15:21.853",
|
||||
"lastModified": "2025-06-26T16:15:29.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -49,7 +49,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
{
|
||||
"url": "https://github.com/github/advisory-database/pull/5730",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/Rootingg/483b09b760d031b62b172f2153f3ed2a",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-45784",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-18T14:15:44.553",
|
||||
"lastModified": "2025-06-18T15:15:26.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-06-26T15:54:43.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,77 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dph-400se_firmware:1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C5562F5-D61A-4D1F-B899-0C6EEC46DBEF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dph-400se:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E5534B1-36A0-4CC4-A3D4-5BB69026EA51"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dph-400s_firmware:1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88E473A7-5416-4273-B07C-F8A95C6F3E9D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dph-400s:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AEF259E-170D-4061-A011-40C16DED82AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cybermaya.in/posts/Post-37/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-46109",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-18T15:15:27.430",
|
||||
"lastModified": "2025-06-18T16:15:27.607",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-06-26T15:51:06.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pbootcms:pbootcms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.2.5",
|
||||
"versionEndIncluding": "3.2.10",
|
||||
"matchCriteriaId": "44A4044B-0AD2-4EF8-9922-E7551D9550D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://cocr.cc/2025/04/17/pbootcms/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pbootcmspro/PbootCMS/issues/22",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-46157",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-18T14:15:44.687",
|
||||
"lastModified": "2025-06-18T14:15:44.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-06-26T15:53:12.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:efrotech:timetrax:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A6B0950-B7A3-4F00-9572-CD0754B60859"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://efrotech.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://timetrax.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/morphine009/CVE-2025-46157",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-46158",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-20T18:15:28.440",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"lastModified": "2025-06-26T16:15:30.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en el kernel de redoxOS antes del commit 5d41cd7c permite que un atacante local provoque una denegaci\u00f3n de servicio a trav\u00e9s de la llamada al sistema `setitimer`"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Marsman1996/pocs/tree/master/redox/CVE-2025-46158",
|
||||
@ -28,6 +63,10 @@
|
||||
{
|
||||
"url": "https://gitlab.redox-os.org/redox-os/kernel/-/merge_requests/386",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.redox-os.org/redox-os/kernel/-/issues/164",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-503xx/CVE-2025-50350.json
Normal file
21
CVE-2025/CVE-2025-503xx/CVE-2025-50350.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-50350",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-26T16:15:30.980",
|
||||
"lastModified": "2025-06-26T16:15:30.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PHPGurukul Pre-School Enrollment System Project v1.0 is vulnerable to Directory Traversal in manage-classes.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-516xx/CVE-2025-51671.json
Normal file
21
CVE-2025/CVE-2025-516xx/CVE-2025-51671.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-51671",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-26T16:15:31.147",
|
||||
"lastModified": "2025-06-26T16:15:31.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability was discovered in the PHPGurukul Dairy Farm Shop Management System 1.3. The vulnerability allows remote attackers to execute arbitrary SQL code via the category and categorycode parameters in a POST request to the manage-categories.php file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Dairy-Farm-Shop-Management-System/SQL/SQL_injection_edit-category.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-51672",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-26T15:15:23.140",
|
||||
"lastModified": "2025-06-26T15:15:23.140",
|
||||
"lastModified": "2025-06-26T16:15:31.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A time-based blind SQL injection vulnerability was identified in the PHPGurukul Dairy Farm Shop Management System 1.3. The vulnerability exists in the manage-companies.php file and allows remote attackers to execute arbitrary SQL code via the companyname parameter in a POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Dairy-Farm-Shop-Management-System/SQL/SQL_injection_edit-company.md",
|
||||
|
68
CVE-2025/CVE-2025-524xx/CVE-2025-52477.json
Normal file
68
CVE-2025/CVE-2025-524xx/CVE-2025-52477.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-52477",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-26T17:15:30.897",
|
||||
"lastModified": "2025-06-26T17:15:30.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/octo-sts/app/commit/0f177fde54f9318e33f0bba6abaea9463a7c3afd",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octo-sts/app/commit/b3976e39bd8c8c217c0670747d34a4499043da92",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octo-sts/app/security/advisories/GHSA-h3qp-hwvr-9xcq",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octo-sts/app/security/advisories/GHSA-h3qp-hwvr-9xcq",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5209",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-06-17T06:15:21.870",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:01:40.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,10 +39,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivorysearch:ivory_search:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.5.10",
|
||||
"matchCriteriaId": "22748013-0B1D-4F84-B054-175E592B407B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8b51dc46-62c8-45b5-96ce-fb774b430388/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6134",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T19:15:34.633",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:46:43.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertClient_client_id.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertClient_client_id.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312603",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312603",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592839",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6135",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T19:15:34.850",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:44:08.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,83 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_client_id.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_nominee_id.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312604",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312604",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592840",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592841",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6136",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T20:15:27.863",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:37:17.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312605",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312605",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592842",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6137",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T20:15:28.040",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:33:18.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,28 +122,86 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "827828BD-015A-458C-8E00-37B2BF489F2D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D751C3BC-20DC-4896-B334-EE3A00F600BF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiScheduleCfg-20ddf0aa11858053a171f052787c202f",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312606",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312606",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592911",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6139",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T21:15:24.513",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:27:37.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -120,26 +120,74 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "827828BD-015A-458C-8E00-37B2BF489F2D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D751C3BC-20DC-4896-B334-EE3A00F600BF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-shadow-20ddf0aa118580f5a455cd5dbc521472",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312608",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312608",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592922",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6159",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T04:15:56.140",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:21:06.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Aalok-zz/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312634",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312634",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593177",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6160",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T05:15:21.567",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:15:47.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sourcecodester:downloading_client_database_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C3702A6-BD59-4AF1-B3FD-5EF35EA9D00D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yitianweiming/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312635",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312635",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593216",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6161",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T05:15:21.833",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T16:04:27.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:simple_food_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2178235-ED8E-4C5D-90E4-C276B189FB36"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kakalalaww/CVE/issues/17",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312636",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312636",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593237",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6173",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-17T07:15:18.630",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-26T15:57:47.900",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:webkul:qloapps:1.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A58133B7-029B-4E77-8470-C28C0F8CBC35"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/QloApps/SQL_Injection.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/QloApps/SQL_Injection.md#vulnerability-recurrence",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312661",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312661",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593679",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6291",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T01:15:39.067",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T17:00:25.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
@ -131,34 +131,90 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825_firmware:2.03:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16B2A1A7-07D5-4D0D-9EFC-AA89C1D1B67A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7038F8A9-03F3-4442-B371-84801EF05447"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313293",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313293",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593937",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6292",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T01:15:39.257",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T17:25:51.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
@ -131,34 +131,90 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825_firmware:2.03:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16B2A1A7-07D5-4D0D-9EFC-AA89C1D1B67A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7038F8A9-03F3-4442-B371-84801EF05447"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313294",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313294",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593938",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6293",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T01:15:39.447",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T17:22:14.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/1xxxgg/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313295",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313295",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593996",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/1xxxgg/cve/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6294",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T01:15:39.630",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T17:21:26.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/1xxxgg/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313296",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313296",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593997",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6295",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T02:15:21.020",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T17:19:48.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/1xxxgg/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313297",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313297",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593998",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/1xxxgg/cve/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6300",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T03:15:28.243",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T17:14:20.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GarminYoung/myCVE/issues/10",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313300",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313300",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.595366",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6301",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T03:15:28.420",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T17:09:26.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,66 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujk305:notice_board_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D07C17AC-0890-411C-8BAF-35EFDD134BAD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313301",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313301",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.595373",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6341",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T13:15:19.980",
|
||||
"lastModified": "2025-06-23T20:16:40.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-26T17:31:18.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,28 +122,75 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabian:school_fees_payment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA0F147-F254-4156-BAB0-6D889FEEEC1C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tuooo/CVE/issues/15",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313336",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313336",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597023",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6342",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T14:15:32.260",
|
||||
"lastModified": "2025-06-20T14:15:32.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-06-26T15:43:29.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. This issue affects some unknown processing of the file /admin/admin_football.php. The manipulation of the argument pid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Este problema afecta a un procesamiento desconocido del archivo /admin/admin_football.php. La manipulaci\u00f3n del argumento pid provoca una inyecci\u00f3n SQL. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ltranquility/CVE/issues/7",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313337",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313337",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597043",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6343",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T14:15:32.667",
|
||||
"lastModified": "2025-06-20T14:15:32.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-06-26T15:41:01.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in code-projects Online Shoe Store 1.0. Affected is an unknown function of the file /admin/admin_product.php. The manipulation of the argument pid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/admin_product.php. La manipulaci\u00f3n del argumento pid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ltranquility/CVE/issues/6",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313338",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313338",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597044",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6344",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T14:15:32.970",
|
||||
"lastModified": "2025-06-20T14:15:32.970",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-06-26T15:38:17.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in code-projects Online Shoe Store 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /contactus.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en code-projects Online Shoe Store 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /contactus.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ltranquility/CVE/issues/5",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313339",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313339",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597045",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6697",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-26T15:15:24.840",
|
||||
"lastModified": "2025-06-26T15:15:24.840",
|
||||
"lastModified": "2025-06-26T16:15:32.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597386",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597386",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6698",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-26T15:15:25.023",
|
||||
"lastModified": "2025-06-26T15:15:25.023",
|
||||
"lastModified": "2025-06-26T16:15:33.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597389",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597389",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-66xx/CVE-2025-6699.json
Normal file
141
CVE-2025/CVE-2025-66xx/CVE-2025-6699.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-6699",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-26T16:15:34.590",
|
||||
"lastModified": "2025-06-26T16:15:34.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in LabRedesCefetRJ WeGIA 3.4.0. This affects an unknown part of the file /html/funcionario/cadastro_funcionario.php of the component Cadastro de Funcion\u00e1rio. The manipulation of the argument Nome/Sobrenome leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This is a different issue than CVE-2025-23030. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README7.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313965",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313965",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597401",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-67xx/CVE-2025-6700.json
Normal file
141
CVE-2025/CVE-2025-67xx/CVE-2025-6700.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-6700",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-26T16:15:35.740",
|
||||
"lastModified": "2025-06-26T16:15:35.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in Xuxueli xxl-sso 1.1.0. This vulnerability affects unknown code of the file /xxl-sso-server/login. The manipulation of the argument errorMsg leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-01/report.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313966",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313966",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597456",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-67xx/CVE-2025-6701.json
Normal file
137
CVE-2025/CVE-2025-67xx/CVE-2025-6701.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-6701",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-26T16:15:36.930",
|
||||
"lastModified": "2025-06-26T16:15:36.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in Xuxueli xxl-sso 1.1.0. This issue affects some unknown processing of the file /xxl-sso-server/doLogin. The manipulation of the argument redirect_url leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-02.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313967",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313967",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597472",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-67xx/CVE-2025-6702.json
Normal file
141
CVE-2025/CVE-2025-67xx/CVE-2025-6702.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-6702",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-26T16:15:38.033",
|
||||
"lastModified": "2025-06-26T16:15:38.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in linlinjava litemall 1.8.0. Affected is an unknown function of the file /wx/comment/post. The manipulation of the argument adminComment leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ctf-n0el4kls.notion.site/Litemall-Mass-Assignment-Vulnerability-in-wx-comment-post-21441990f447808b86d1cb15e37ecae9?source=copy_link",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313968",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313968",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597473",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
104
README.md
104
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-26T16:00:26.737438+00:00
|
||||
2025-06-26T18:00:18.817510+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-26T15:35:49.490000+00:00
|
||||
2025-06-26T17:31:18.840000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
299452
|
||||
299471
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `27`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2025-48921](CVE-2025/CVE-2025-489xx/CVE-2025-48921.json) (`2025-06-26T14:15:30.043`)
|
||||
- [CVE-2025-48922](CVE-2025/CVE-2025-489xx/CVE-2025-48922.json) (`2025-06-26T14:15:30.180`)
|
||||
- [CVE-2025-48923](CVE-2025/CVE-2025-489xx/CVE-2025-48923.json) (`2025-06-26T14:15:30.300`)
|
||||
- [CVE-2025-49003](CVE-2025/CVE-2025-490xx/CVE-2025-49003.json) (`2025-06-26T14:15:30.433`)
|
||||
- [CVE-2025-51672](CVE-2025/CVE-2025-516xx/CVE-2025-51672.json) (`2025-06-26T15:15:23.140`)
|
||||
- [CVE-2025-52573](CVE-2025/CVE-2025-525xx/CVE-2025-52573.json) (`2025-06-26T14:15:30.577`)
|
||||
- [CVE-2025-52887](CVE-2025/CVE-2025-528xx/CVE-2025-52887.json) (`2025-06-26T15:15:23.350`)
|
||||
- [CVE-2025-52900](CVE-2025/CVE-2025-529xx/CVE-2025-52900.json) (`2025-06-26T15:15:23.520`)
|
||||
- [CVE-2025-52902](CVE-2025/CVE-2025-529xx/CVE-2025-52902.json) (`2025-06-26T15:15:23.687`)
|
||||
- [CVE-2025-53002](CVE-2025/CVE-2025-530xx/CVE-2025-53002.json) (`2025-06-26T15:15:23.873`)
|
||||
- [CVE-2025-53007](CVE-2025/CVE-2025-530xx/CVE-2025-53007.json) (`2025-06-26T15:15:24.043`)
|
||||
- [CVE-2025-5682](CVE-2025/CVE-2025-56xx/CVE-2025-5682.json) (`2025-06-26T14:15:31.280`)
|
||||
- [CVE-2025-6674](CVE-2025/CVE-2025-66xx/CVE-2025-6674.json) (`2025-06-26T14:15:34.047`)
|
||||
- [CVE-2025-6675](CVE-2025/CVE-2025-66xx/CVE-2025-6675.json) (`2025-06-26T14:15:34.177`)
|
||||
- [CVE-2025-6676](CVE-2025/CVE-2025-66xx/CVE-2025-6676.json) (`2025-06-26T14:15:34.353`)
|
||||
- [CVE-2025-6677](CVE-2025/CVE-2025-66xx/CVE-2025-6677.json) (`2025-06-26T14:15:34.540`)
|
||||
- [CVE-2025-6694](CVE-2025/CVE-2025-66xx/CVE-2025-6694.json) (`2025-06-26T14:15:34.777`)
|
||||
- [CVE-2025-6695](CVE-2025/CVE-2025-66xx/CVE-2025-6695.json) (`2025-06-26T14:15:34.967`)
|
||||
- [CVE-2025-6696](CVE-2025/CVE-2025-66xx/CVE-2025-6696.json) (`2025-06-26T15:15:24.633`)
|
||||
- [CVE-2025-6697](CVE-2025/CVE-2025-66xx/CVE-2025-6697.json) (`2025-06-26T15:15:24.840`)
|
||||
- [CVE-2025-6698](CVE-2025/CVE-2025-66xx/CVE-2025-6698.json) (`2025-06-26T15:15:25.023`)
|
||||
- [CVE-2025-6706](CVE-2025/CVE-2025-67xx/CVE-2025-6706.json) (`2025-06-26T14:15:35.157`)
|
||||
- [CVE-2025-6707](CVE-2025/CVE-2025-67xx/CVE-2025-6707.json) (`2025-06-26T14:15:35.313`)
|
||||
- [CVE-2025-6709](CVE-2025/CVE-2025-67xx/CVE-2025-6709.json) (`2025-06-26T14:15:35.463`)
|
||||
- [CVE-2025-6710](CVE-2025/CVE-2025-67xx/CVE-2025-6710.json) (`2025-06-26T14:15:35.613`)
|
||||
- [CVE-2024-52928](CVE-2024/CVE-2024-529xx/CVE-2024-52928.json) (`2025-06-26T17:15:30.287`)
|
||||
- [CVE-2025-30131](CVE-2025/CVE-2025-301xx/CVE-2025-30131.json) (`2025-06-26T17:15:30.743`)
|
||||
- [CVE-2025-34042](CVE-2025/CVE-2025-340xx/CVE-2025-34042.json) (`2025-06-26T16:15:27.197`)
|
||||
- [CVE-2025-34043](CVE-2025/CVE-2025-340xx/CVE-2025-34043.json) (`2025-06-26T16:15:27.490`)
|
||||
- [CVE-2025-34044](CVE-2025/CVE-2025-340xx/CVE-2025-34044.json) (`2025-06-26T16:15:27.670`)
|
||||
- [CVE-2025-34045](CVE-2025/CVE-2025-340xx/CVE-2025-34045.json) (`2025-06-26T16:15:27.830`)
|
||||
- [CVE-2025-34046](CVE-2025/CVE-2025-340xx/CVE-2025-34046.json) (`2025-06-26T16:15:27.987`)
|
||||
- [CVE-2025-34047](CVE-2025/CVE-2025-340xx/CVE-2025-34047.json) (`2025-06-26T16:15:28.140`)
|
||||
- [CVE-2025-34048](CVE-2025/CVE-2025-340xx/CVE-2025-34048.json) (`2025-06-26T16:15:28.273`)
|
||||
- [CVE-2025-34049](CVE-2025/CVE-2025-340xx/CVE-2025-34049.json) (`2025-06-26T16:15:28.413`)
|
||||
- [CVE-2025-36034](CVE-2025/CVE-2025-360xx/CVE-2025-36034.json) (`2025-06-26T16:15:28.567`)
|
||||
- [CVE-2025-44141](CVE-2025/CVE-2025-441xx/CVE-2025-44141.json) (`2025-06-26T16:15:28.753`)
|
||||
- [CVE-2025-50350](CVE-2025/CVE-2025-503xx/CVE-2025-50350.json) (`2025-06-26T16:15:30.980`)
|
||||
- [CVE-2025-51671](CVE-2025/CVE-2025-516xx/CVE-2025-51671.json) (`2025-06-26T16:15:31.147`)
|
||||
- [CVE-2025-52477](CVE-2025/CVE-2025-524xx/CVE-2025-52477.json) (`2025-06-26T17:15:30.897`)
|
||||
- [CVE-2025-6699](CVE-2025/CVE-2025-66xx/CVE-2025-6699.json) (`2025-06-26T16:15:34.590`)
|
||||
- [CVE-2025-6700](CVE-2025/CVE-2025-67xx/CVE-2025-6700.json) (`2025-06-26T16:15:35.740`)
|
||||
- [CVE-2025-6701](CVE-2025/CVE-2025-67xx/CVE-2025-6701.json) (`2025-06-26T16:15:36.930`)
|
||||
- [CVE-2025-6702](CVE-2025/CVE-2025-67xx/CVE-2025-6702.json) (`2025-06-26T16:15:38.033`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `25`
|
||||
Recently modified CVEs: `37`
|
||||
|
||||
- [CVE-2024-51977](CVE-2024/CVE-2024-519xx/CVE-2024-51977.json) (`2025-06-26T15:15:22.167`)
|
||||
- [CVE-2025-44203](CVE-2025/CVE-2025-442xx/CVE-2025-44203.json) (`2025-06-20T16:15:28.700`)
|
||||
- [CVE-2025-45784](CVE-2025/CVE-2025-457xx/CVE-2025-45784.json) (`2025-06-18T15:15:26.710`)
|
||||
- [CVE-2025-45890](CVE-2025/CVE-2025-458xx/CVE-2025-45890.json) (`2025-06-20T16:15:29.240`)
|
||||
- [CVE-2025-46109](CVE-2025/CVE-2025-461xx/CVE-2025-46109.json) (`2025-06-18T16:15:27.607`)
|
||||
- [CVE-2025-46157](CVE-2025/CVE-2025-461xx/CVE-2025-46157.json) (`2025-06-18T14:15:44.687`)
|
||||
- [CVE-2025-46179](CVE-2025/CVE-2025-461xx/CVE-2025-46179.json) (`2025-06-20T15:15:20.860`)
|
||||
- [CVE-2025-6173](CVE-2025/CVE-2025-61xx/CVE-2025-6173.json) (`2025-06-17T20:50:23.507`)
|
||||
- [CVE-2025-6342](CVE-2025/CVE-2025-63xx/CVE-2025-6342.json) (`2025-06-20T14:15:32.260`)
|
||||
- [CVE-2025-6343](CVE-2025/CVE-2025-63xx/CVE-2025-6343.json) (`2025-06-20T14:15:32.667`)
|
||||
- [CVE-2025-6344](CVE-2025/CVE-2025-63xx/CVE-2025-6344.json) (`2025-06-20T14:15:32.970`)
|
||||
- [CVE-2025-6345](CVE-2025/CVE-2025-63xx/CVE-2025-6345.json) (`2025-06-20T15:15:35.800`)
|
||||
- [CVE-2025-6346](CVE-2025/CVE-2025-63xx/CVE-2025-6346.json) (`2025-06-20T15:15:35.983`)
|
||||
- [CVE-2025-6351](CVE-2025/CVE-2025-63xx/CVE-2025-6351.json) (`2025-06-20T16:15:30.250`)
|
||||
- [CVE-2025-6360](CVE-2025/CVE-2025-63xx/CVE-2025-6360.json) (`2025-06-26T15:35:49.490`)
|
||||
- [CVE-2025-6361](CVE-2025/CVE-2025-63xx/CVE-2025-6361.json) (`2025-06-26T15:33:24.173`)
|
||||
- [CVE-2025-6362](CVE-2025/CVE-2025-63xx/CVE-2025-6362.json) (`2025-06-26T15:30:56.573`)
|
||||
- [CVE-2025-6364](CVE-2025/CVE-2025-63xx/CVE-2025-6364.json) (`2025-06-26T15:28:57.953`)
|
||||
- [CVE-2025-6436](CVE-2025/CVE-2025-64xx/CVE-2025-6436.json) (`2025-06-26T14:15:32.083`)
|
||||
- [CVE-2025-6531](CVE-2025/CVE-2025-65xx/CVE-2025-6531.json) (`2025-06-26T15:15:24.250`)
|
||||
- [CVE-2025-6555](CVE-2025/CVE-2025-65xx/CVE-2025-6555.json) (`2025-06-26T14:15:32.340`)
|
||||
- [CVE-2025-6556](CVE-2025/CVE-2025-65xx/CVE-2025-6556.json) (`2025-06-26T14:15:32.510`)
|
||||
- [CVE-2025-6620](CVE-2025/CVE-2025-66xx/CVE-2025-6620.json) (`2025-06-26T14:15:32.737`)
|
||||
- [CVE-2025-6621](CVE-2025/CVE-2025-66xx/CVE-2025-6621.json) (`2025-06-26T14:15:32.933`)
|
||||
- [CVE-2025-6624](CVE-2025/CVE-2025-66xx/CVE-2025-6624.json) (`2025-06-26T14:15:33.070`)
|
||||
- [CVE-2025-46158](CVE-2025/CVE-2025-461xx/CVE-2025-46158.json) (`2025-06-26T16:15:30.733`)
|
||||
- [CVE-2025-51672](CVE-2025/CVE-2025-516xx/CVE-2025-51672.json) (`2025-06-26T16:15:31.347`)
|
||||
- [CVE-2025-5209](CVE-2025/CVE-2025-52xx/CVE-2025-5209.json) (`2025-06-26T16:01:40.640`)
|
||||
- [CVE-2025-6134](CVE-2025/CVE-2025-61xx/CVE-2025-6134.json) (`2025-06-26T16:46:43.547`)
|
||||
- [CVE-2025-6135](CVE-2025/CVE-2025-61xx/CVE-2025-6135.json) (`2025-06-26T16:44:08.650`)
|
||||
- [CVE-2025-6136](CVE-2025/CVE-2025-61xx/CVE-2025-6136.json) (`2025-06-26T16:37:17.293`)
|
||||
- [CVE-2025-6137](CVE-2025/CVE-2025-61xx/CVE-2025-6137.json) (`2025-06-26T16:33:18.123`)
|
||||
- [CVE-2025-6139](CVE-2025/CVE-2025-61xx/CVE-2025-6139.json) (`2025-06-26T16:27:37.157`)
|
||||
- [CVE-2025-6159](CVE-2025/CVE-2025-61xx/CVE-2025-6159.json) (`2025-06-26T16:21:06.720`)
|
||||
- [CVE-2025-6160](CVE-2025/CVE-2025-61xx/CVE-2025-6160.json) (`2025-06-26T16:15:47.617`)
|
||||
- [CVE-2025-6161](CVE-2025/CVE-2025-61xx/CVE-2025-6161.json) (`2025-06-26T16:04:27.483`)
|
||||
- [CVE-2025-6173](CVE-2025/CVE-2025-61xx/CVE-2025-6173.json) (`2025-06-26T15:57:47.900`)
|
||||
- [CVE-2025-6291](CVE-2025/CVE-2025-62xx/CVE-2025-6291.json) (`2025-06-26T17:00:25.153`)
|
||||
- [CVE-2025-6292](CVE-2025/CVE-2025-62xx/CVE-2025-6292.json) (`2025-06-26T17:25:51.993`)
|
||||
- [CVE-2025-6293](CVE-2025/CVE-2025-62xx/CVE-2025-6293.json) (`2025-06-26T17:22:14.003`)
|
||||
- [CVE-2025-6294](CVE-2025/CVE-2025-62xx/CVE-2025-6294.json) (`2025-06-26T17:21:26.107`)
|
||||
- [CVE-2025-6295](CVE-2025/CVE-2025-62xx/CVE-2025-6295.json) (`2025-06-26T17:19:48.817`)
|
||||
- [CVE-2025-6300](CVE-2025/CVE-2025-63xx/CVE-2025-6300.json) (`2025-06-26T17:14:20.587`)
|
||||
- [CVE-2025-6301](CVE-2025/CVE-2025-63xx/CVE-2025-6301.json) (`2025-06-26T17:09:26.040`)
|
||||
- [CVE-2025-6341](CVE-2025/CVE-2025-63xx/CVE-2025-6341.json) (`2025-06-26T17:31:18.840`)
|
||||
- [CVE-2025-6342](CVE-2025/CVE-2025-63xx/CVE-2025-6342.json) (`2025-06-26T15:43:29.243`)
|
||||
- [CVE-2025-6343](CVE-2025/CVE-2025-63xx/CVE-2025-6343.json) (`2025-06-26T15:41:01.887`)
|
||||
- [CVE-2025-6344](CVE-2025/CVE-2025-63xx/CVE-2025-6344.json) (`2025-06-26T15:38:17.790`)
|
||||
- [CVE-2025-6697](CVE-2025/CVE-2025-66xx/CVE-2025-6697.json) (`2025-06-26T16:15:32.560`)
|
||||
- [CVE-2025-6698](CVE-2025/CVE-2025-66xx/CVE-2025-6698.json) (`2025-06-26T16:15:33.583`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
173
_state.csv
173
_state.csv
@ -46920,7 +46920,7 @@ CVE-2010-5301,0,0,583f9fd1855b9ace664450510c74afa0308b2c32502d708f3d3f65ee639063
|
||||
CVE-2010-5302,0,0,b62265de4c92e92a54d7af21e552ac20d2c2227e399750b58f8eff05f4537bed,2025-04-12T10:46:40.837000
|
||||
CVE-2010-5303,0,0,919bf68db8b6d2c5950419ce6e7250d2013f50cfb20cc8a56a52d0fd01c71453,2025-04-12T10:46:40.837000
|
||||
CVE-2010-5304,0,0,48036b1f373720fee56e102c186ef2e310b690ba81271d62a16d97190ca830d7,2024-11-21T01:22:59.840000
|
||||
CVE-2010-5305,0,0,085485fc6a88b06e190d257793ca8788456f836c5ff6f108a4a47ab93628111e,2025-04-14T22:15:15.097000
|
||||
CVE-2010-5305,0,1,499ea1bdb15df7a8d35ce20f05ad9120c34649ed8c4a690075475d3f0091e8be,2025-06-26T17:15:28.510000
|
||||
CVE-2010-5306,0,0,9f3ea0a94065bb5498fad05090ddf3c76e0c9df583a4b7bc215d0969343ab9d1,2025-04-12T10:46:40.837000
|
||||
CVE-2010-5307,0,0,bc576dd47d7c761bc7f31868f952c0a795c38e45f0b3ab832ee30e5beaaf3737,2025-04-12T10:46:40.837000
|
||||
CVE-2010-5308,0,0,6ef7cedc49106e184c9711ac6468d3345c3d283034bdc91feba0c63406f7004c,2025-04-12T10:46:40.837000
|
||||
@ -141501,7 +141501,7 @@ CVE-2019-6531,0,0,cb8e590b8dc2b819ec3417d9fe3c30485ca87bc7b47bfac77102001703d3c0
|
||||
CVE-2019-6532,0,0,a7ab7164edd4c12d3debed5586db0a7c6623e927293f801349a342480742ae8b,2024-11-21T04:46:38.490000
|
||||
CVE-2019-6533,0,0,49b6e28bf6c53111484228f93153f3996088f0421e9034f39c81529e61d45eb9,2024-11-21T04:46:38.613000
|
||||
CVE-2019-6534,0,0,e5204fe70dc3ff28a7a3db42b94447f761369232b14976f03ea6e86d98ae3939,2024-11-21T04:46:38.723000
|
||||
CVE-2019-6535,0,0,c389b064cf420992b4cbdb1aa85b69b98f0e3e2df5b26b75b2dc583725661d0e,2024-11-21T04:46:38.847000
|
||||
CVE-2019-6535,0,1,72c9fe16487beb7a7661e33e88c3d3e4341292d280dffb3c091d5e8eb2300d14,2025-06-26T17:15:29.873000
|
||||
CVE-2019-6536,0,0,d8e992c6f2fce5b99ce1d72dcd26655f7c91fab051a2222d8b2b4f4bd0830b3e,2024-11-21T04:46:38.983000
|
||||
CVE-2019-6537,0,0,6c45610650e5ad4f0b15376d8c75ca2fc178e09541e1961c96b819cd77466402,2024-11-21T04:46:39.100000
|
||||
CVE-2019-6538,0,0,785d0cee55b648926c5eec7c7be1f61aba1bce6d66fce133fdb6b7975e33bf8e,2025-05-22T20:15:20.660000
|
||||
@ -237904,7 +237904,7 @@ CVE-2023-47020,0,0,77958b1e974ce3a0af29c7a34f0132e69536d415fc0c65e83c01b308bc43d
|
||||
CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620bb5,2025-06-17T17:15:31.567000
|
||||
CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000
|
||||
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
|
||||
CVE-2023-47029,0,0,12b49b3ede09c8051f0adf031401d06f966f450320e558466627896d3b8f70e3,2025-06-23T20:16:21.633000
|
||||
CVE-2023-47029,0,1,4a5e4f14db9e64a4730c819d67cb16af7f601e9fe9c282f515ffd92e0e6c576f,2025-06-26T16:15:24.467000
|
||||
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
|
||||
CVE-2023-47030,0,0,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000
|
||||
CVE-2023-47031,0,0,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000
|
||||
@ -238139,7 +238139,7 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c
|
||||
CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000
|
||||
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
|
||||
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
|
||||
CVE-2023-47294,0,0,d3ea47b285562c39058a8eacb339c5fa3addec63cf1a3e5b9333a2e4450da9ee,2025-06-23T20:16:21.633000
|
||||
CVE-2023-47294,0,1,298f059dd5123a102ff37a75adfdff11de59ed0a76d591fb6a7672a1acc54a2a,2025-06-26T16:15:25.483000
|
||||
CVE-2023-47295,0,0,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000
|
||||
CVE-2023-47297,0,0,c14fd87e4e15a5f8e3c0ca94948127ff1c65a697a69ee20c14900dd6601ff3f3,2025-06-26T12:46:49.080000
|
||||
CVE-2023-47298,0,0,4c4acd197c7d9d302a966e30e51e5a36b182be0dd23706e335a822f619b88bec,2025-06-26T12:44:00.433000
|
||||
@ -240480,7 +240480,7 @@ CVE-2023-50447,0,0,3b21483f93a61c36d17c54e0e41c9704319aa4bb30ed9f5f7c0bbdda96e01
|
||||
CVE-2023-50448,0,0,1356900f30989b11a427d95591f2fc88232d31d851bd0fac96eb18865bdb0f57,2024-11-21T08:37:01.203000
|
||||
CVE-2023-50449,0,0,ba270c267a15999c5436411e78a8d97ec1196d3bb1ec0bc251b111bb6e5f871a,2024-11-21T08:37:01.360000
|
||||
CVE-2023-5045,0,0,79d8cf6ee5e9a4b50139a237bce749eaaf7a601766908d94e71febe8668c11b0,2024-11-21T08:40:57.920000
|
||||
CVE-2023-50450,0,0,45504d3230911e141a0b81195226e9e83abec179bd39db1e436592ff9e3aa99b,2025-06-23T20:16:21.633000
|
||||
CVE-2023-50450,0,1,1b6cd36b67fe27dd05ee97a39dba06431d3a62ba2619eb6715b633c7d7630ca3,2025-06-26T16:15:25.700000
|
||||
CVE-2023-50453,0,0,76d310904c175d9636c853af62d4f3f3ad8ffd78a8288d3d4c4903fddbeede50,2024-11-21T08:37:01.517000
|
||||
CVE-2023-50454,0,0,bfaedf03326a6acc4075b380331bfd96efd576ce55b3819a4e641140e3d7172a,2024-11-21T08:37:01.673000
|
||||
CVE-2023-50455,0,0,cf36f17a14a454b579fdc438155082da9fe3202a2d2238909649381efcfac5b3,2024-11-21T08:37:01.837000
|
||||
@ -274832,7 +274832,7 @@ CVE-2024-51962,0,0,aa5b86386886c09d6f7775b329f01551003fe6d3a5aeafe034e2c76e33a39
|
||||
CVE-2024-51963,0,0,65d15561511f4792024c62d0c3dbbe1a84656f415b27a24cc7fcb099d4df16a8,2025-04-10T20:15:21.723000
|
||||
CVE-2024-51966,0,0,69a0d46bcaa28466534ecd74cb2be650273566964ba1c75d7e0cb22b97d45b63,2025-04-10T20:15:21.850000
|
||||
CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000
|
||||
CVE-2024-51977,0,1,ae0abc3896aa34da58408d57a73670d1ca04bb80f1162d8b9aa7bfda81885d8d,2025-06-26T15:15:22.167000
|
||||
CVE-2024-51977,0,0,ae0abc3896aa34da58408d57a73670d1ca04bb80f1162d8b9aa7bfda81885d8d,2025-06-26T15:15:22.167000
|
||||
CVE-2024-51978,0,0,080238c493ca5141a0b64da3bf5cefc734cbe73438596d0d624c9190d618c4c1,2025-06-25T14:15:22.823000
|
||||
CVE-2024-51979,0,0,ea92e40117ad8fa111fa4480baeb19d3876eb6d36a7c15795f6000e48a841626,2025-06-25T14:15:23.313000
|
||||
CVE-2024-5198,0,0,3fa9ec394e1888d66e83812554066b455d9458d73cda1ea9275cc8bdd128d3dc,2025-06-10T16:12:09.340000
|
||||
@ -275470,6 +275470,7 @@ CVE-2024-52923,0,0,1238a4879a0bc2d925f8ecf6f96b3d1c816c52f29e36df61c25ed1ce84892
|
||||
CVE-2024-52924,0,0,8b254b4a26863de18a0a4930d1f91105918cf608ca8edf047ba4e3990b61fb38,2025-03-07T20:15:37.240000
|
||||
CVE-2024-52925,0,0,4d21065ff66a1748231e5c3543316979502c5f13302562a708f4fc89ea5a4eb2,2025-02-26T15:15:23.867000
|
||||
CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000
|
||||
CVE-2024-52928,1,1,61501d64bda944c41887cd192eae26bb5ef6d9f05584bccd2c3019f70d252de6,2025-06-26T17:15:30.287000
|
||||
CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000
|
||||
CVE-2024-52935,0,0,da218bbcf32aa8ee196d0cc84ac3289085c87dcfe3a543f2e97a81e0e8e7c479,2025-01-13T19:15:10.993000
|
||||
CVE-2024-52936,0,0,fc5419fb37a8a058b0ac6dbc1882fd48de1fcccd6ca5038c660a45c78f704b96,2025-01-31T17:15:15.567000
|
||||
@ -278072,7 +278073,7 @@ CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7
|
||||
CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e713d0,2025-03-17T19:15:24.050000
|
||||
CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000
|
||||
CVE-2024-56914,0,0,064f87427a8016e13b3b895075549080817f6e33abdd6a0f7fbfa426e2cf3bd7,2025-05-21T16:11:27.750000
|
||||
CVE-2024-56915,1,1,d0a7ece1ed916208607537f968bfb4040658279997580bd41282170145899660,2025-06-26T15:15:22.570000
|
||||
CVE-2024-56915,0,1,d1dc048e1760bdf298c6c4a68351a2e047dc4225796624a31f6d3918062444d3,2025-06-26T16:15:25.910000
|
||||
CVE-2024-56916,0,0,8d791153df4968d3eeeb69a9c48a710c5c1054b60793c3fffc13c78de96c4f0f,2025-06-24T20:15:24.643000
|
||||
CVE-2024-56917,0,0,22eee042f4d8b258955468fa7b726ed4840860e6e36c91120f332296bae2e2f7,2025-06-24T20:15:24.790000
|
||||
CVE-2024-56918,0,0,52ee2653b76f15ba0701a308965e0214f9660afd1f602bc274c062083d531183,2025-06-24T20:15:24.953000
|
||||
@ -290029,7 +290030,7 @@ CVE-2025-27581,0,0,010725d7ecbfe0dd212b958a3a5bd2c7e9f3630c39f4e0964f9540d000321
|
||||
CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000
|
||||
CVE-2025-27584,0,0,f03e6726bedccad19322a88f13d717b29a57c1713f548b043d4f11c0c134f427,2025-03-04T17:15:20.527000
|
||||
CVE-2025-27585,0,0,720b68d2eda984711942f08d1f5d1c3e9ff08ec0907ec239e78ca92044ae9f6a,2025-03-04T17:15:20.690000
|
||||
CVE-2025-27587,0,0,960b7acde73bcafbbb57e7f733045f5ae624fbfd08a41dbeb9a4515706dcb98c,2025-06-17T20:50:23.507000
|
||||
CVE-2025-27587,0,1,c6b99f6544f7fddd6a84845f540214401821374f565d374449096dc905b663ad,2025-06-26T17:15:30.497000
|
||||
CVE-2025-2759,0,0,6df40746bca0a076cfdd89fceb7edae074243de43f4b4548050e4f6a4f49b153,2025-05-23T15:55:02.040000
|
||||
CVE-2025-27590,0,0,967f795bd4c85a7326c3accbc97af4e437c14d446f9275cd756d84bf07c7deb5,2025-03-10T14:01:33.053000
|
||||
CVE-2025-27591,0,0,bde746d629d3275aa4bd9bd60b4521aac06adacde1e58fa17d924514d9ced6d1,2025-03-21T21:15:36.737000
|
||||
@ -290705,7 +290706,7 @@ CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccb
|
||||
CVE-2025-29316,0,0,edbfef5d2b6ba20f5ddacf4404f4ebf4c89ebe5fca32750f4069bf616e710afc,2025-05-05T18:15:41.723000
|
||||
CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000
|
||||
CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000
|
||||
CVE-2025-29331,1,1,90046cc9a3feb2cec161f106e72630fc24bc5ac7fa93d7b91d9be26c030ae076,2025-06-26T15:15:22.690000
|
||||
CVE-2025-29331,0,1,f0dcafb3ed78607ac3045ba7d382bd813392e80d643543a468e881da18e7a32b,2025-06-26T16:15:26.300000
|
||||
CVE-2025-29339,0,0,3c8767e6fc1c7537f5abbed85f26508361863e04ceb6434ef3e14faf20c7a82c,2025-06-19T00:23:24.013000
|
||||
CVE-2025-2935,0,0,7b37cfe809822a560bb0e6dbeb565e9e50c614feb77ac7a6501335760c490b55,2025-06-06T14:07:28.330000
|
||||
CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000
|
||||
@ -291100,6 +291101,7 @@ CVE-2025-30118,0,0,63bb6fe6df661494db5327da07bd867838234c34a82e4f268cbe5bdf2fffb
|
||||
CVE-2025-30122,0,0,c1d95302660e92c024ec5fc6b6a580530031934f019c4b2b9b52ef0f1377e16a,2025-03-21T14:15:17.523000
|
||||
CVE-2025-30123,0,0,2971729320ad92fd03f998696461ed7cc92e08495aa1f702cd91222eaa49f43d,2025-03-21T18:15:39.737000
|
||||
CVE-2025-3013,0,0,2510a4bfa4128f19ce6014fbf27f574c71d4567996b6fa0082d5c4fc5dc4cae3,2025-04-01T20:26:30.593000
|
||||
CVE-2025-30131,1,1,b1d711e5bc5a7f8880f2541968e1014cbf97c89343c6d4d34427146d26bf6218,2025-06-26T17:15:30.743000
|
||||
CVE-2025-30132,0,0,6dd8c4b2ac9edac69820a35ebc388d786aab74afcd8113c3b2124d47b6d5313e,2025-03-21T14:15:17.687000
|
||||
CVE-2025-30137,0,0,098aef1c3a2b56ae0bd3f7cd4c3ba2daa5151c1c497ad5404ed49f32de8e9e0d,2025-03-25T17:16:24.817000
|
||||
CVE-2025-30138,0,0,83aa1d57612a741bf6f8d83571e5eab154debd0cec6fc852bdac2ca81686a43b,2025-03-25T17:16:25.520000
|
||||
@ -293724,6 +293726,14 @@ CVE-2025-34039,0,0,33065581e59fb510332e7c56f1b2c71b818ba8cafc063bc369ac3087f87d0
|
||||
CVE-2025-3404,0,0,3995b7b57c7d03bbf3188d8b6d9621100ea7b4d3b13f0d6dea5824ed5e0cab26,2025-04-21T14:23:45.950000
|
||||
CVE-2025-34040,0,0,ab246a583bbce961c122b7ec2fd5e7d841d24372c199b5859888943ef451ba8c,2025-06-24T02:15:22.673000
|
||||
CVE-2025-34041,0,0,e333513a767b39341f0e963179ee4f68eb159feea05cdd92f7bde27fcf9c7f8e,2025-06-24T02:15:22.820000
|
||||
CVE-2025-34042,1,1,d20727cc5b2bb0c6eafe3acf0e9b3010f1e115ce6353a40e1b67ca9e0345f947,2025-06-26T16:15:27.197000
|
||||
CVE-2025-34043,1,1,2d52dc77b648f719e27a78df4526fabfd1605635b55d1e414e3a580581822b47,2025-06-26T16:15:27.490000
|
||||
CVE-2025-34044,1,1,61b0d8cbede6c09108fbcf061fbd9b1e1b1033a09b76a5ddb42e6f0c6ebb1cbf,2025-06-26T16:15:27.670000
|
||||
CVE-2025-34045,1,1,bdffae3e20819f31c6479e777ee416fa283252727997eafa39503deb0035979c,2025-06-26T16:15:27.830000
|
||||
CVE-2025-34046,1,1,a89bf47e439d8bac18bdb4fc3ea0a63a7d36ebf35b34b383c0d58e384233425a,2025-06-26T16:15:27.987000
|
||||
CVE-2025-34047,1,1,61599c27ad1cedde5912fc00280e94b8abdd593a18efcdf70850d91f3531b35b,2025-06-26T16:15:28.140000
|
||||
CVE-2025-34048,1,1,a99314b47e1847b71167564fe1b15301e09472e3491da33d720fb72f3599e9b1,2025-06-26T16:15:28.273000
|
||||
CVE-2025-34049,1,1,695487e5839753bec655c0e5b29d345d03fbf9083f010851dd27893be026d554,2025-06-26T16:15:28.413000
|
||||
CVE-2025-3405,0,0,a31287bf487edd9888ccf3a2cc660111ad412bcd7d306362616791fdc35de9e0,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3407,0,0,e5cceac7b7d945db6bab90635fdc2ec04fc23eea7f5eaa5ff6a3dce8910502a2,2025-04-08T18:13:53.347000
|
||||
@ -293920,6 +293930,7 @@ CVE-2025-36004,0,0,9607d479475c4db7f6c6570a9fe36d71d16713a1fc60b5c59ba5c3e48b0a3
|
||||
CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000
|
||||
CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000
|
||||
CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000
|
||||
CVE-2025-36034,1,1,8ee05398fa6f54dc6754d1c9d8d0e677baeba0ca01e3ed805653c53e6b9b6357,2025-06-26T16:15:28.567000
|
||||
CVE-2025-36038,0,0,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000
|
||||
CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000
|
||||
CVE-2025-36041,0,0,11b57158081d8cfc9ecc1117a15361007f166439f866b0246174b70d871a2d46,2025-06-16T12:32:18.840000
|
||||
@ -295601,6 +295612,7 @@ CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc
|
||||
CVE-2025-4413,0,0,61cf4ae74dd1877b470f2b4f5c2f8b7d6825e0d478eed1e554284b17cfa549ed,2025-06-18T13:46:52.973000
|
||||
CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000
|
||||
CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000
|
||||
CVE-2025-44141,1,1,ca0cd04b4ca59a878409a8ee6c555ba0b1691a170664d5f0e68e827cddde592d,2025-06-26T16:15:28.753000
|
||||
CVE-2025-44148,0,0,440749a71814d76edeed70dd30fc58f3e0b75eaee931968ee8c88b7d1e24e11d,2025-06-09T18:04:33.580000
|
||||
CVE-2025-4415,0,0,14ae76cc14cb7c5f3c4c963406f20e07ac9834ebdb3d6a3c4d84f73bfd11e915,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4416,0,0,a5c38ae8bb1fb36b46a6d4b035c3955bb8e9a586409097b52f155ce641ec588f,2025-05-21T20:24:58.133000
|
||||
@ -295621,7 +295633,7 @@ CVE-2025-44192,0,0,bbf878f3192590ae7f65b7dd525822e7ec5ccf80ca743afb76c106db31235
|
||||
CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4d4d,2025-05-12T19:42:08.603000
|
||||
CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000
|
||||
CVE-2025-4420,0,0,482e6cb0127b5cd1381f571129f0abb13f48f8e0b486724260c2eec90487cec8,2025-06-04T14:54:33.783000
|
||||
CVE-2025-44203,0,1,986e2440b0483edc0c039355181e2e90648cd0645cc8cf4d5602b1543eba4d43,2025-06-20T16:15:28.700000
|
||||
CVE-2025-44203,0,0,986e2440b0483edc0c039355181e2e90648cd0645cc8cf4d5602b1543eba4d43,2025-06-20T16:15:28.700000
|
||||
CVE-2025-44206,0,0,bcf8c43764d9f23abe08370a8241183b1c8b3a14693e972a7012ad0743e79f9c,2025-06-25T17:15:37.740000
|
||||
CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000
|
||||
CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000
|
||||
@ -295848,7 +295860,7 @@ CVE-2025-45513,0,0,75d2d23377bdf3eb34768546535e2634c77460ec9fb3e1dbc5e6d7c5335e2
|
||||
CVE-2025-45514,0,0,a0097e631e2f67ebed1594ab343f4868011705c17a9a818d4cf23fb2040b09ab,2025-05-27T14:22:03.193000
|
||||
CVE-2025-4552,0,0,78d43dd6fb452cd4c88c9ba8880aef53f1ef01b609cdfafec2c65ebbd9c2ca4a,2025-05-12T17:32:32.760000
|
||||
CVE-2025-45525,0,0,d964bbfa3565b6e3c8c91f8b1ef6cff3eca96639573f7a1a53ee29de90662ea9,2025-06-20T12:15:21.780000
|
||||
CVE-2025-45526,0,0,f72eeed659a8027250b12d631897056fbfbfe8e6b44f159bff91751ee9f25441,2025-06-18T19:15:21.853000
|
||||
CVE-2025-45526,0,1,7c332e0ac82e00dd31b05e654cf89202b648251ee9903ffd3830e5fdc6c807ef,2025-06-26T16:15:29.013000
|
||||
CVE-2025-45529,0,0,e167386bb5394c534585ea5a04f1a046eac90f4928a6eeb5d60ef274f5e67c1c,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4553,0,0,cc42244e3fcc3fa0e4735902b7107755da4e8cf945b2a43e81a0e7fb4c007005,2025-05-16T17:08:50.060000
|
||||
CVE-2025-4554,0,0,689d20479ad000d274d22e94958c98af69dd587a0aebcdb180b3f5df25fbdcf6,2025-05-16T17:05:01.380000
|
||||
@ -295892,7 +295904,7 @@ CVE-2025-45755,0,0,6fe3262fee3e82261947590b30e342c111c5db410776b66947644241532cf
|
||||
CVE-2025-4577,0,0,599a2191d82490cb2917b4663991020a6f76d4cef5dcfc1bbad5bfcf594df4d0,2025-06-12T16:06:39.330000
|
||||
CVE-2025-45779,0,0,7069f589f242601716458d7b26f08f6a87931010ba7c496f215f47c502ef806f,2025-06-13T13:40:52.883000
|
||||
CVE-2025-4578,0,0,8451b1c03045c8ad3abf8c71774c6b63bc79023720225fdd15b30152793b6197,2025-06-04T20:07:45.857000
|
||||
CVE-2025-45784,0,1,d8ad263e5f9bc49f0f9e802fa5a7f8d025670a1aece36310e302714153cfafa9,2025-06-18T15:15:26.710000
|
||||
CVE-2025-45784,0,1,1183046d89fba1b8e7cc428e6740142c348eab38c81fc9b0368caaa8610e4183,2025-06-26T15:54:43.523000
|
||||
CVE-2025-45786,0,0,7a0ba9ce4206224a5dbcb3a3da9e1372f377164d0fd2610cb24fccae3b269758,2025-06-23T20:16:59.783000
|
||||
CVE-2025-45787,0,0,839c7946d0f8e2e3f388e984cf0b3d259f804d96030c23335dfd861ac831e334,2025-05-16T15:38:25.723000
|
||||
CVE-2025-45788,0,0,d9b27095f0d050912ccc839258566df73a65f9582f737413f53a8385c0736d6f,2025-05-16T15:38:16.100000
|
||||
@ -295936,7 +295948,7 @@ CVE-2025-45880,0,0,3705fe6fc368f2fbd94d197728c7493a9d3bdf0bf25c0a8940fe6c0fa1b87
|
||||
CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000
|
||||
CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000
|
||||
CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000
|
||||
CVE-2025-45890,0,1,3a22354013b73314b78077c7b74cb64483d104ae4e83a7c5b965ccaeb3feca9c,2025-06-20T16:15:29.240000
|
||||
CVE-2025-45890,0,0,3a22354013b73314b78077c7b74cb64483d104ae4e83a7c5b965ccaeb3feca9c,2025-06-20T16:15:29.240000
|
||||
CVE-2025-4590,0,0,1338bc68ec3d6917d4ad238b5739bcbca3832b2475d3a347918656638fb549e4,2025-06-02T17:32:17.397000
|
||||
CVE-2025-4591,0,0,09b633064167908f2267d3dc13a3052b782cbd19249bba4734b3313b4950008b,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4592,0,0,5d60bfef7beec0930ab89b7223857faa5fedaa5c280d844c7ee57c05bd2708bf,2025-06-16T12:32:18.840000
|
||||
@ -295971,16 +295983,16 @@ CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112
|
||||
CVE-2025-46096,0,0,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000
|
||||
CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000
|
||||
CVE-2025-46101,0,0,8eb61ce0bd76c46c5a0ea5520ca1a03eea4acd2a3190f70aab698ce7c6299593,2025-06-24T16:15:28.403000
|
||||
CVE-2025-46109,0,1,0e100313151bd857873e539dccfe6f03c22b3a7f3ec7c82f464e42ce5a0237b5,2025-06-18T16:15:27.607000
|
||||
CVE-2025-46109,0,1,a81953cf13c139be94a1c266dfcc581a11077f2b3187b5b6aa057caceb5c0bbc,2025-06-26T15:51:06.490000
|
||||
CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4613,0,0,f577ead831948daefe1272603bfaf0609f1e849af3f425f017bfac9ead135854,2025-06-12T16:06:20.180000
|
||||
CVE-2025-46154,0,0,28136877062a9fbae66fc92d86286e5d62e1cd8a9e62fd05c5a06eb514bf383d,2025-06-09T18:06:28.423000
|
||||
CVE-2025-46157,0,1,e45c9755c0a2abbf93a7d97959a5d3bb221d20d255b6e42a5c09cf764b4e1fde,2025-06-18T14:15:44.687000
|
||||
CVE-2025-46158,0,0,3bb20fd037af8bfa0079f7a48d7ffdaebb00525fc8dd8a5c624354cb5d1cc754,2025-06-23T20:16:21.633000
|
||||
CVE-2025-46157,0,1,15ef5f092148ce037ce48bb6f5f34f7194730ff07b7e1a3244e0e823362d2bc8,2025-06-26T15:53:12.230000
|
||||
CVE-2025-46158,0,1,496021feb7f909223ea58ad77cd1644e57cf02b0d8b0ef3c8c84068942351766,2025-06-26T16:15:30.733000
|
||||
CVE-2025-46173,0,0,4405d31e0bbca77b9a85dba04df7d6cbed12d0763cfb8e942421606ded04a3cf,2025-06-10T15:12:53.720000
|
||||
CVE-2025-46176,0,0,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000
|
||||
CVE-2025-46178,0,0,91c6404535de808aefa017d6b4ebfff23f380aedc9da42e3620cbfea00da5246,2025-06-12T16:06:47.857000
|
||||
CVE-2025-46179,0,1,1e9fb24c75699a26b4ed9a93c6adcfe246aa8bd706709f527d2af0a4d885ad58,2025-06-20T15:15:20.860000
|
||||
CVE-2025-46179,0,0,1e9fb24c75699a26b4ed9a93c6adcfe246aa8bd706709f527d2af0a4d885ad58,2025-06-20T15:15:20.860000
|
||||
CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000
|
||||
CVE-2025-46189,0,0,deb091a7b16f83dfae0adf87dba814de45a16152802aa3583ba953e5461c909b,2025-05-22T19:01:31.820000
|
||||
CVE-2025-46190,0,0,49ae57538389712e46bb1f8218d4d6fdb9fc8500296b0c348e5059e767ffc2b0,2025-05-22T18:51:35.560000
|
||||
@ -297588,9 +297600,9 @@ CVE-2025-48918,0,0,96bed736df52792450e3608cc07a547f9c416534292e707cd90567bb1e330
|
||||
CVE-2025-48919,0,0,b13f4700030161c8cea02111785c6dde091bc79546f3b93073b1eb28b1babf2b,2025-06-16T12:32:18.840000
|
||||
CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000
|
||||
CVE-2025-48920,0,0,c443e19ac648bfe69c31e79bc1998d46349e50d790bd54c32a87884332343dbc,2025-06-16T12:32:18.840000
|
||||
CVE-2025-48921,1,1,60108674aa9da19d1b7091b595c8ed40f7a1d94323589c6d910996093bab2cc9,2025-06-26T14:15:30.043000
|
||||
CVE-2025-48922,1,1,7a5047668d334930881e2b457606985ec361c1d853d924c02455f87edd193b7e,2025-06-26T14:15:30.180000
|
||||
CVE-2025-48923,1,1,1fa4ea82497ce4c558f5cb0484eb2951b14a350e9b4f9f4f35aab01f62adb054,2025-06-26T14:15:30.300000
|
||||
CVE-2025-48921,0,0,60108674aa9da19d1b7091b595c8ed40f7a1d94323589c6d910996093bab2cc9,2025-06-26T14:15:30.043000
|
||||
CVE-2025-48922,0,0,7a5047668d334930881e2b457606985ec361c1d853d924c02455f87edd193b7e,2025-06-26T14:15:30.180000
|
||||
CVE-2025-48923,0,0,1fa4ea82497ce4c558f5cb0484eb2951b14a350e9b4f9f4f35aab01f62adb054,2025-06-26T14:15:30.300000
|
||||
CVE-2025-48925,0,0,21a2cb4f4a9620e34d454c14028a00f2b70dc9544a21aca3383488609c689c05,2025-05-29T14:29:50.247000
|
||||
CVE-2025-48926,0,0,7c30f38d95fc987bd6e8852b968a55a7e51032b7c79b54853568428b8d32ecb1,2025-05-29T14:29:50.247000
|
||||
CVE-2025-48927,0,0,709ff3b5cba6df23c4ebbabd98b2844e61f0bb8547f17efd794502cb0ceeec47,2025-05-29T14:29:50.247000
|
||||
@ -297647,7 +297659,7 @@ CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee
|
||||
CVE-2025-49000,0,0,f8cce1a2bdee8bde170fefa186e3e45152457ed27acc2f9d05d9f849c91c807b,2025-06-04T14:54:33.783000
|
||||
CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094302,2025-06-05T14:07:47.397000
|
||||
CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000
|
||||
CVE-2025-49003,1,1,6d872892fd4df39d0f411338678fc504959c64f83cc9150d4c7ae1cc0dc9727d,2025-06-26T15:15:22.963000
|
||||
CVE-2025-49003,0,0,6d872892fd4df39d0f411338678fc504959c64f83cc9150d4c7ae1cc0dc9727d,2025-06-26T15:15:22.963000
|
||||
CVE-2025-49004,0,0,89d47ac006a07f0278b924493f5a5a2553c688202c5da141c2c812c60b3a1cb1,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49006,0,0,69cfb489d390e5afe2e42023086b2832eeed6d765863e99bd3de00a5d46a4fa7,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000
|
||||
@ -298162,6 +298174,7 @@ CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a
|
||||
CVE-2025-5034,0,0,32c24ba6ccd75156344e37a326a475bfa55837c0e754ff953557111ff3de4bc2,2025-06-23T20:16:21.633000
|
||||
CVE-2025-50348,0,0,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000
|
||||
CVE-2025-50349,0,0,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000
|
||||
CVE-2025-50350,1,1,5cd3d30f7068da80d0dc38eff27e468cefa8ec3f83bc60e37e01ddd3f4cbf5de,2025-06-26T16:15:30.980000
|
||||
CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000
|
||||
CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
|
||||
CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
|
||||
@ -298264,7 +298277,8 @@ CVE-2025-5164,0,0,228da27fe94094da78c818ea5e2c1e5953ef9870e1a7763a1facd97f4dd57f
|
||||
CVE-2025-5165,0,0,b944072ac0091ca469e0b415fb7abdf162d341970b7082fcfaff9d04957c85a4,2025-06-03T15:40:01.863000
|
||||
CVE-2025-5166,0,0,c51ae421fabf1219a3900c58419bdaa5117f65f9603b27137cff53c0e0d61b00,2025-06-03T15:40:15.497000
|
||||
CVE-2025-5167,0,0,d0507ecf0b5b21e24f107649f2515c6afbb660790e07751f18cd594dd93f34bc,2025-06-03T15:40:34.607000
|
||||
CVE-2025-51672,1,1,64d1bb8cff829221eb90bfd1173e0c4255b40a8e40cd3f00bb2e2708ccd14132,2025-06-26T15:15:23.140000
|
||||
CVE-2025-51671,1,1,3e71586572ea65b47e25c56ef10a036b0c05a5900a3ee3e329b1f54be8d8c9c1,2025-06-26T16:15:31.147000
|
||||
CVE-2025-51672,0,1,1bc0234a905d224e3d492d4ebb2a0117a74c9cce1645deaf0a5468c16d68de52,2025-06-26T16:15:31.347000
|
||||
CVE-2025-5168,0,0,74f02a822faaa8b5a46a78e41282b22e771403dfc5a44608e54bea89178ff6fe,2025-06-03T15:40:48.337000
|
||||
CVE-2025-5169,0,0,478bfc131e88e29d02dd1ccd61a9e6c142c0208ac4743abe27cdac119eac9f7b,2025-06-03T15:41:01.973000
|
||||
CVE-2025-5170,0,0,2d3c44ad97f24506915e1ae8aa2894c6137b30f378f725193e8dabaa89f599c6,2025-06-03T15:41:52.177000
|
||||
@ -298298,7 +298312,7 @@ CVE-2025-5205,0,0,4e2cf941cdcf5c4895f1e6095123f642f58566d13011fecdf14fc65595d0e6
|
||||
CVE-2025-5206,0,0,feed10da244a1180a12944193b9a34afaab380339e02b711b6b86c10a65dd729,2025-06-05T14:14:49.180000
|
||||
CVE-2025-5207,0,0,e402cb7000c0d3ec5faf704526317d521bb7be7fab48c7474536b7fb38ce6981,2025-06-05T14:14:30.010000
|
||||
CVE-2025-5208,0,0,9e9535cfb50c25096d995fee715ad33ab744750f67296c60cac7b3a386d28ef1,2025-06-05T14:14:06.397000
|
||||
CVE-2025-5209,0,0,8bf17c054f37888c321563ea5fff8f80a6eb5146a899768828b942498237d5fe,2025-06-17T20:50:23.507000
|
||||
CVE-2025-5209,0,1,1de988bb6fc9688228254af9049355449ffefba36f51df5a462735aed22ede34,2025-06-26T16:01:40.640000
|
||||
CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fbbf,2025-06-05T14:13:54.527000
|
||||
CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000
|
||||
CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000
|
||||
@ -298347,6 +298361,7 @@ CVE-2025-52467,0,0,16105c9074c96ad94abfdf299814ac8afdc45b40f5844eda614417a0d3d4c
|
||||
CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000
|
||||
CVE-2025-52471,0,0,0c62d382ed0af363c08f042f130801cb12a4f00ca1898ecf3fe6d67ae2476ac6,2025-06-24T20:15:26.033000
|
||||
CVE-2025-52474,0,0,85659b730b44219986935e49453dd6cf44bae5c711fd564545190739032f0da6,2025-06-23T20:16:59.783000
|
||||
CVE-2025-52477,1,1,e07378f4d27997f6acd49a22f94ad2426dee743f2043ef8c0d7e90c5eb6640db,2025-06-26T17:15:30.897000
|
||||
CVE-2025-52479,0,0,c2fb883dab9af3bda17257faea1540c97a64f864f363f43f9aac347719c31a58,2025-06-25T16:15:27.017000
|
||||
CVE-2025-5248,0,0,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000
|
||||
CVE-2025-52480,0,0,9058ad9c4f4d9cf4adc8bc18d88405dbdd03cfd1af621ce6c0bb86ccfe2ced26,2025-06-25T17:15:38.590000
|
||||
@ -298377,7 +298392,7 @@ CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcf
|
||||
CVE-2025-52570,0,0,b69e7827dc71b47cbfc70d06c560ede1e01f1eed518d271e063fa0ddf9df6ff5,2025-06-24T04:15:50.360000
|
||||
CVE-2025-52571,0,0,93605af77865e4b4bbd8aa8df37b6227ed19cbe7c36e4563dfbf22f7ad6141df,2025-06-24T20:15:26.213000
|
||||
CVE-2025-52572,0,0,c9098d5ca2a634c2c4a58c403cfc6222ba614b823936e2401333651171589a19,2025-06-24T21:15:25.463000
|
||||
CVE-2025-52573,1,1,45796b9039d24b9a3eda334ce45b25e7e4892eb3f5a75cc205d2727ac54b744b,2025-06-26T14:15:30.577000
|
||||
CVE-2025-52573,0,0,45796b9039d24b9a3eda334ce45b25e7e4892eb3f5a75cc205d2727ac54b744b,2025-06-26T14:15:30.577000
|
||||
CVE-2025-52574,0,0,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000
|
||||
CVE-2025-52576,0,0,54ca2c256007cfab31d182d53578f909d2f84aab8167fde4bfa01ad557b852cc,2025-06-25T18:15:22.537000
|
||||
CVE-2025-5258,0,0,fb6007864f0f198afc07f9e5f2cd9992c3bc7deee34ac7dac8830ce62da80bc3,2025-06-24T08:15:24.397000
|
||||
@ -298441,7 +298456,7 @@ CVE-2025-52880,0,0,9cb07f316e3d88e0df580ddbed7ea9b43e79f625bd4ca243674ed28fb6c24
|
||||
CVE-2025-52882,0,0,1202797e512191e9de7b995f3a96465f7bfc2ed3174a803e0c7dd48572c30229,2025-06-24T20:15:26.543000
|
||||
CVE-2025-52883,0,0,94a59b16d2725ff940e9d9c5d66af8696ae28208bd1cc6d6422de88432398bcc,2025-06-24T21:15:26.030000
|
||||
CVE-2025-52884,0,0,111efc59963d9cf24b8cfd776de05a966fe0af3c7a58d02e676305ff800577c2,2025-06-24T21:15:26.207000
|
||||
CVE-2025-52887,1,1,1b1934b1ff0f584f251ffd339ac8ae7cc59d8fb82a7344dfd94d51d04ab35793,2025-06-26T15:15:23.350000
|
||||
CVE-2025-52887,0,0,1b1934b1ff0f584f251ffd339ac8ae7cc59d8fb82a7344dfd94d51d04ab35793,2025-06-26T15:15:23.350000
|
||||
CVE-2025-52888,0,0,3d1af33939cf7d42fdad330956d26c92022bdd0439ccab86c4344f860a5a72bc,2025-06-24T20:15:26.700000
|
||||
CVE-2025-52889,0,0,9da61724b301758b81e861d135c2b4f87c1d9193c45f2d7ba9df9323c5b8a14a,2025-06-25T18:15:22.653000
|
||||
CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000
|
||||
@ -298449,8 +298464,8 @@ CVE-2025-52890,0,0,21f05b9dc7685c75ed3a78bf53cc0622eed7e0158a3757e7d2757bba0471e
|
||||
CVE-2025-52893,0,0,fde8c69e5dfb177b45c8843696effb13dc55e52e52a7f13d69ef2cf3a5264867,2025-06-25T17:15:39.523000
|
||||
CVE-2025-52894,0,0,86c1ea7749bd2ac6272c7b237f4f0745b29d5d1222611ddfdb5e5bdeb4764540,2025-06-25T17:15:39.677000
|
||||
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
|
||||
CVE-2025-52900,1,1,c5c483edb4b5cd5d587284cd43f3e048c5fac4dcd7c164812dc6bcc063dba44c,2025-06-26T15:15:23.520000
|
||||
CVE-2025-52902,1,1,ba0957095b9b497f96459df71ff00fe93cee82677e7b9be6aedce9789f09da30,2025-06-26T15:15:23.687000
|
||||
CVE-2025-52900,0,0,c5c483edb4b5cd5d587284cd43f3e048c5fac4dcd7c164812dc6bcc063dba44c,2025-06-26T15:15:23.520000
|
||||
CVE-2025-52902,0,0,ba0957095b9b497f96459df71ff00fe93cee82677e7b9be6aedce9789f09da30,2025-06-26T15:15:23.687000
|
||||
CVE-2025-5291,0,0,30fc605f4380fb7e9cd3dc4c3c29792847dcfc90b0ea5fa3ca9a29d145a853dc,2025-06-17T20:50:23.507000
|
||||
CVE-2025-52916,0,0,aaaed48e0f18bf7221f6e78c081756a27d5cc78db64cc6bd43ff354b6dcf72ac,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52917,0,0,2c681ba1c2eaadda0232ca155b7a07de3998b80dd04ae3c39bb2c896cba07a42,2025-06-23T20:16:21.633000
|
||||
@ -298485,8 +298500,8 @@ CVE-2025-52979,0,0,52505f03c11370107b014986dc0342ab4c8462260c5f831736e7ef7e18fd3
|
||||
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
|
||||
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
|
||||
CVE-2025-52999,0,0,8a6973aa5c242bcc72c2aa1d3ea8125d3c697581af3172eff6b5e1b688b524fb,2025-06-25T17:15:39.820000
|
||||
CVE-2025-53002,1,1,3d69344d128cf8e6eba45391a732f0f15c3f4b3fd0c2794df181a207042522e3,2025-06-26T15:15:23.873000
|
||||
CVE-2025-53007,1,1,2141606fce0283ce971232c003b310c482d4ee9ab26eb96012fd96c997a705a2,2025-06-26T15:15:24.043000
|
||||
CVE-2025-53002,0,0,3d69344d128cf8e6eba45391a732f0f15c3f4b3fd0c2794df181a207042522e3,2025-06-26T15:15:23.873000
|
||||
CVE-2025-53007,0,0,2141606fce0283ce971232c003b310c482d4ee9ab26eb96012fd96c997a705a2,2025-06-26T15:15:24.043000
|
||||
CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000
|
||||
CVE-2025-53021,0,0,f00c7a7e87b168adf26db9622068d05e126e48777cea689658514ba01dbc3fdf,2025-06-24T20:15:26.867000
|
||||
CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000
|
||||
@ -298783,7 +298798,7 @@ CVE-2025-5676,0,0,1ca2c49bb4d510b5740938a869bb2d11a6220d1957dff2d9f9653e2673322f
|
||||
CVE-2025-5677,0,0,364b4a61489a27818eacb60d1e1f6c17d4c2d09e9d81b672d48b3e04da11ebb6,2025-06-10T19:31:37.290000
|
||||
CVE-2025-5679,0,0,39a76065dd3011f556df8ecc5c1607529488c249cbea269aa42dbb97296654d5,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5682,1,1,4d46e61991b0a8d86404415b7a96b5fc7e62533e3aaf1ba49adc7537bb8ebbe3,2025-06-26T14:15:31.280000
|
||||
CVE-2025-5682,0,0,4d46e61991b0a8d86404415b7a96b5fc7e62533e3aaf1ba49adc7537bb8ebbe3,2025-06-26T14:15:31.280000
|
||||
CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000
|
||||
CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000
|
||||
@ -299090,12 +299105,12 @@ CVE-2025-6130,0,0,cb569be39f5f1da076d06669e0896e22c8cd60dff8ebc57d155295bc5acb6c
|
||||
CVE-2025-6131,0,0,2866309ab3a411ed34af4bfc174dd80cc2f38df6ce0809f56ec34a44e1386fa4,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6132,0,0,4820b926dce549d59ace28c44f962f1b682b6ad27fe3050ad7fcb6e14d23357a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6133,0,0,e8ce544a9effd7cb8b54da22c642c5245af611c0276c41dc8559e4d5a610718a,2025-06-24T19:44:40.803000
|
||||
CVE-2025-6134,0,0,e314e671c8bc5848fa55335e6580660a169004bde35b809cd5c9e61560c3067a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6135,0,0,ee51cf2c4222bfb9ad2c176fca2a379a43397e990b2eb061f92b5c8b5b0a323a,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6136,0,0,e9caa20ba8500c81ebc641ee6a945f6f003a8d2240dcf3f113058eaffabd98de,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6137,0,0,61118b7323f6830919ef7135da4ecd957265d06148eafb09448f3d4e9c68092c,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6134,0,1,8a23584764f618ffd2d4995a9b4d16e5d5cdabc35d0090302e1cb1d8481cb193,2025-06-26T16:46:43.547000
|
||||
CVE-2025-6135,0,1,506099148e534a57e74eec0360b5146bb6d16f5700b5c048c16b15d25659f5e9,2025-06-26T16:44:08.650000
|
||||
CVE-2025-6136,0,1,5f7e8be2da42633353469049b7512fa5d07106f6da9174f3722e62acbd430a92,2025-06-26T16:37:17.293000
|
||||
CVE-2025-6137,0,1,ddc67afa546c83e767dcbbc7b7e064e9742a4bea6b7f9760a6f55350f1985699,2025-06-26T16:33:18.123000
|
||||
CVE-2025-6138,0,0,69c19eff97e06c34f5b8cfdfba9cb33f9498a49d64177b5418e8373bd3e2dbbf,2025-06-20T14:34:32.397000
|
||||
CVE-2025-6139,0,0,a963e3b0573264a9167c8ed8cca13c432a733696dfe2f1dd43cd1680a94578bf,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6139,0,1,1e573675182fd2c70c93e9d60e690c79091588fc0dffcb1bdf91b56cec3b2b4c,2025-06-26T16:27:37.157000
|
||||
CVE-2025-6140,0,0,90c8d7894599b8728f992434ba3431a19d89cc26541cb2e9752a70dfc43adc3f,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6141,0,0,da13bc3db5b6441ec02280dd31d41a049dec0de80cbb8316bf3d83796a9c0f04,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6142,0,0,e80f42b3df69bc7d34694aade5534d0147faa50d387373f1d151bcbe4aa458f3,2025-06-17T20:50:23.507000
|
||||
@ -299115,9 +299130,9 @@ CVE-2025-6155,0,0,3e8fc69cbf51a07d93c7df9f9e6e4b66e36cc96b90ecd10cbf6a0ab1b9592e
|
||||
CVE-2025-6156,0,0,50bad226a589479fea329c4b9ea16aa953872a48df791a98c47ba27f5989fe25,2025-06-24T15:52:28.587000
|
||||
CVE-2025-6157,0,0,180c03ace223f2bdc4a4810f873bfe6ccf5f7edb279d8977a5782cbd3224fa72,2025-06-24T15:52:26.320000
|
||||
CVE-2025-6158,0,0,2f36d74bb802a051d651546127c3dc725b5baddaf659643b5bacdd29188892d6,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6159,0,0,38e8ac5e5294c42b259b82c8daef65af0d7b30e502051f62b250d30a5a031545,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6160,0,0,ade16d050fe213428b173ad29429dde198ba45d3ed2aa7e95b41154f41eeda9d,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6161,0,0,eef177824c88350da4912eea2cf199bbbd914eebd1a4811f8e4dddf4e232cff7,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6159,0,1,b6654ae04ca00ebe3d5ed69f1af3600e83fc73919e57aba07df0f12e772f5196,2025-06-26T16:21:06.720000
|
||||
CVE-2025-6160,0,1,5ffd3a5dc242cfd1fecdd7fd3e437c972a4776d68b464499becd18bc1698dcb4,2025-06-26T16:15:47.617000
|
||||
CVE-2025-6161,0,1,0e873c05638bc7fdac845123aea4c5a97ffb7356cc08e5c74933eb0b81f079d0,2025-06-26T16:04:27.483000
|
||||
CVE-2025-6162,0,0,e84675b06fecb8413603d644d7dc1a9c194bceeff6262adb1f964a4383ba4305,2025-06-23T19:20:50.197000
|
||||
CVE-2025-6163,0,0,6e13a9e163cb9e3184563f5c7b63b8596f5e63cf06bd837983ba5aafb4c041ca,2025-06-23T19:11:22.090000
|
||||
CVE-2025-6164,0,0,c17ffe7ec702387ad5d177a5e91c7296a9ef4f80a11f6ea499b523afd7af1e02,2025-06-23T19:01:39.440000
|
||||
@ -299127,7 +299142,7 @@ CVE-2025-6167,0,0,e83c0c1ea86d6b605cd16c602292d01c1e3a7ce00c593e57ae080fcd8bf11e
|
||||
CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6170,0,0,b78aff7a1c8e8db8ce7aabd9ccc1b29ff578e0357c573a194099cb12287faea6,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000
|
||||
CVE-2025-6173,0,1,9d65cce56e690409faedd082c2e62db2916ca8efaa5a80d53a28792b8de1cc38,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6173,0,1,c070b1517acd95c5e869ebc2e1f1712fafd19138bea48c0324a49cddfc5a27e5,2025-06-26T15:57:47.900000
|
||||
CVE-2025-6177,0,0,f708d677d17f57d89176eeab0f542a182dcbda72661cc0eb13a3bc38d1575fd3,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6179,0,0,ef3e1c0f37267be4950d18366a27dfd0b0e58f054fc3240188e66ee490b59e39,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6191,0,0,f0f3b688b48f4f8183a91df95fa38ffe0dfc74cf3682559765b5451f2fa22fc1,2025-06-23T20:16:59.783000
|
||||
@ -299170,15 +299185,15 @@ CVE-2025-6286,0,0,0986e442b62971a42e733069c69f2b535595029d77fbaa4fa93e52b8d99f5a
|
||||
CVE-2025-6287,0,0,1f0442e805994dfa210a8eb3aa304f70a76a3d031c0d44f5ffd1b0d3dde5756c,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6288,0,0,9ce149ad42505ec2b4ca64cb24a668e9a7b4bbe84cfa5abc98150f3205f4a2c1,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6290,0,0,fd5137afaf81f121f32b5fb857c9bd0fbd66061602c501bf3307842726132473,2025-06-26T02:15:22.733000
|
||||
CVE-2025-6291,0,0,d55175acbacd88914c9be973fe6f91be8167aa92b1c93ae033cdffad235834e1,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6292,0,0,ff04dbdfad10a3b13607f775be002341c1f09a7a43bda27cdc2a017c4c5d4f1d,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6293,0,0,51c953c2806e51616f5a3280e43a32ce3c0eb07cbfb8381ded97a6c641ce5cdc,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6294,0,0,5b3ad9b265c9fd5c11c1726b2df030f0862788c5649c89e9fd5dedb4b770da23,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6295,0,0,0bd04a66f87e78692ba4dee61309ed11f9c3c7899587e401de1e30ab4b60ad63,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6291,0,1,dc1a968051b9db85759355228419cc46165b7a6778eb4ff9ec8664745bc75db4,2025-06-26T17:00:25.153000
|
||||
CVE-2025-6292,0,1,950777517b48d376f4e9cfbb6475ca5763192a729885525f030e7df89973a74b,2025-06-26T17:25:51.993000
|
||||
CVE-2025-6293,0,1,30342ac281aebc0a30969c59d523a1a3a2cc7a536dbaaadfbb8317c27c072af8,2025-06-26T17:22:14.003000
|
||||
CVE-2025-6294,0,1,2f20bcf126712080bcfde5ea574f9107db7d0aaac3eeac826f2b5961068819f0,2025-06-26T17:21:26.107000
|
||||
CVE-2025-6295,0,1,c68657e703a32d8a27635af3bd0cbcf47590717c8db4b4d0b6e9b6fdea795c7c,2025-06-26T17:19:48.817000
|
||||
CVE-2025-6296,0,0,3199152674d281a8b0bfa9392ec2d741dc87f4294f9f5fd910f569a20facdf65,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6299,0,0,0c5467d80bc58e4cc48c65f2c08fc824bcbb0be1a5cdf91f595765a0183ebb54,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6300,0,0,53a28bfc1e73c0675ee7f66dbc37a4105a5dda9c8fc91d61645574e9adb9d26c,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6301,0,0,0880affa9b0fdf60c148716cf68fa23897d70c14416dd813615fdf9f7c220894,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6300,0,1,e2ec6cf8b98712d407f84e21f599347de059cbe66e2eb84a9fc4eb6c7fb27268,2025-06-26T17:14:20.587000
|
||||
CVE-2025-6301,0,1,1a6a37865c9ad16879d590be6f25642d0cfa9abb4a67fa3b3dc503342ed3c79d,2025-06-26T17:09:26.040000
|
||||
CVE-2025-6302,0,0,e3539c9b5f9b261c59bd1f61e25234e8559a654a63f9c967a1007ae0f4a5c2be,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6303,0,0,001666194667549d93b9d4329658990f457777439e0228e9bd08f4416d371963,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6304,0,0,55c7409c08e8bc681802a6630bca19d5a26cc48af50cbcd82a055c7cc06a550e,2025-06-23T20:16:40.143000
|
||||
@ -299213,14 +299228,14 @@ CVE-2025-6336,0,0,3d3db1672f06ec0712a78cc92696ede18c9e871cf673cd2a145a9a0172e32b
|
||||
CVE-2025-6337,0,0,161e6a8a3656b81227fce426686a6291bb2989b8708f75a64f2ebb684f913edf,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6339,0,0,39a93e9b819524c01a5f6335f7f0645f0590e6d2af3e1fa5bf2ca3254fef0d62,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6340,0,0,bb34cef064dae7650a8fedfe9b945186839c51af4c5b089557f29d1c74de6290,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6341,0,0,67770d3bee16aefa22be7a7779675d17d597f87fcf7023ade15e713960edc616,2025-06-23T20:16:40.143000
|
||||
CVE-2025-6342,0,1,5d9d9ecb9d33089ab84260bc82e847bbc6b45d0c5d5a6033667e80e558bbce7a,2025-06-20T14:15:32.260000
|
||||
CVE-2025-6343,0,1,a1b8aeec96a4bd99be027cf1f3da5d5ab1bbf468484db3d3bde3ced7ee12be8d,2025-06-20T14:15:32.667000
|
||||
CVE-2025-6344,0,1,eb4eda875caa8d1445f14b88fb0e9bf5ceab8e991408dbaf902ad01031844f8c,2025-06-20T14:15:32.970000
|
||||
CVE-2025-6345,0,1,b33f24903860f4767c24c3b23695242ccd8af4a1055fa40f0a8676c27b00f49a,2025-06-20T15:15:35.800000
|
||||
CVE-2025-6346,0,1,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b38,2025-06-20T15:15:35.983000
|
||||
CVE-2025-6341,0,1,6eb97d536857f3ed3053b28a0b496ad883570be814c5c64c307e1ec4c95a4991,2025-06-26T17:31:18.840000
|
||||
CVE-2025-6342,0,1,6934fab8f5de2e37566c0bd37708ff4b41608b68048fce7936eae8dbc964dbfb,2025-06-26T15:43:29.243000
|
||||
CVE-2025-6343,0,1,486d933b030c79ce931ba483ff730af554d03b5f6333e6a7ea67c21e98e6807a,2025-06-26T15:41:01.887000
|
||||
CVE-2025-6344,0,1,d4ebe8546071c6f599337efb2154e70f6fbd03816d527c4e2779e3b0d262295d,2025-06-26T15:38:17.790000
|
||||
CVE-2025-6345,0,0,b33f24903860f4767c24c3b23695242ccd8af4a1055fa40f0a8676c27b00f49a,2025-06-20T15:15:35.800000
|
||||
CVE-2025-6346,0,0,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b38,2025-06-20T15:15:35.983000
|
||||
CVE-2025-6347,0,0,314d9452b387c10ac762b3b1128a41f845645f5c30e1ff2ca81e9f93cc334357,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6351,0,1,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000
|
||||
CVE-2025-6351,0,0,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000
|
||||
CVE-2025-6352,0,0,9d15046a1965b14eb3ab7c9082bc02622d7ca5d63392e4ee8604e05d4ffdeda2,2025-06-26T13:50:10.427000
|
||||
CVE-2025-6353,0,0,629fe18bcfbf2dd023d18f9e595e887b68dcd365925026ba25f8edb8b1dcbbd9,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6354,0,0,2e29c14f11a4c0713b5bb333b8bcc3f82a6e68c07f853a1752a2daff23ce8fab,2025-06-26T13:30:17.410000
|
||||
@ -299229,11 +299244,11 @@ CVE-2025-6356,0,0,761cd0ad99957f2e0c9e007ddb509923b5d31be3535a0aa240f06ebfbe76fe
|
||||
CVE-2025-6357,0,0,d5588ad4e25e1b2b823de5512a21009640a1b05467799f68a81f2448bf8cd2ab,2025-06-26T13:10:38.540000
|
||||
CVE-2025-6358,0,0,e3ae463d2ac1773151451d366ab85d1d8dfcdf17ef41453f2202072b1b028458,2025-06-26T13:04:08.447000
|
||||
CVE-2025-6359,0,0,4c6b3a89015ba9383cd0f30179b8f5c4de98d22d2446e398ba201465b8f64821,2025-06-26T12:59:46.793000
|
||||
CVE-2025-6360,0,1,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000
|
||||
CVE-2025-6361,0,1,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000
|
||||
CVE-2025-6362,0,1,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000
|
||||
CVE-2025-6360,0,0,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000
|
||||
CVE-2025-6361,0,0,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000
|
||||
CVE-2025-6362,0,0,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000
|
||||
CVE-2025-6363,0,0,2cbacbb5cc6c904843e22e84139859ddf8eb0282b6eb20c13a55fd99ccbe395c,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6364,0,1,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000
|
||||
CVE-2025-6364,0,0,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000
|
||||
CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000
|
||||
CVE-2025-6368,0,0,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000
|
||||
@ -299285,7 +299300,7 @@ CVE-2025-6432,0,0,709154992723f331a52a5ad0200366583cc8c17511eb731f8a67ceaf01c780
|
||||
CVE-2025-6433,0,0,388a9e3c4ce770334337fb5b365eb81eea0a09dd37d26b543d992df75886bad1,2025-06-25T13:15:26.977000
|
||||
CVE-2025-6434,0,0,25d2270e780cca263d82591b90f92aabefeed0e60517c8b2fc08da412d22a7a5,2025-06-25T15:15:26.313000
|
||||
CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
|
||||
CVE-2025-6436,0,1,64ee87009d3f405effe05016ce18b97f871de07171703adf5abee597ea8e22e5,2025-06-26T14:15:32.083000
|
||||
CVE-2025-6436,0,0,64ee87009d3f405effe05016ce18b97f871de07171703adf5abee597ea8e22e5,2025-06-26T14:15:32.083000
|
||||
CVE-2025-6442,0,0,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000
|
||||
CVE-2025-6443,0,0,d16bcbf7380cf8685ab0402330d7fcb780db92921035d764bb7de8978decb036,2025-06-25T22:15:20.960000
|
||||
CVE-2025-6444,0,0,001723fa0e5477753e66a94b40ca3050bd1b3c324935cd810fadea01384c5f5a,2025-06-25T18:15:24.463000
|
||||
@ -299352,7 +299367,7 @@ CVE-2025-6527,0,0,a9a66d6d6a8e0192016e66fcbc4b16654b5cc67da7f8d638e0a1029d3e911b
|
||||
CVE-2025-6528,0,0,2d8652c6e064cbe08fda9e1243d2cdd94889748bd307dfeccdf2fd9f8f69ecd5,2025-06-23T23:15:23.783000
|
||||
CVE-2025-6529,0,0,5939d745bd3d487f857a2a174ee40a3eef3cd5f9ed4541420b1ccd8bcf150ec0,2025-06-23T23:15:23.980000
|
||||
CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328ca,2025-06-23T23:15:24.177000
|
||||
CVE-2025-6531,0,1,7cbb8659e90d4ef287eaefdc968ecbc80a7b050e0fc89f77f70317cf36b2eee7,2025-06-26T15:15:24.250000
|
||||
CVE-2025-6531,0,0,7cbb8659e90d4ef287eaefdc968ecbc80a7b050e0fc89f77f70317cf36b2eee7,2025-06-26T15:15:24.250000
|
||||
CVE-2025-6532,0,0,86b97cc081ce799f93178d6ecc465a0c60d5e09731b91755b70d7769569024c8,2025-06-25T15:15:26.467000
|
||||
CVE-2025-6533,0,0,d492ee571eaee5df043f384c635c6ac246fddd4934afdb55035bafe65d55de49,2025-06-25T15:15:26.600000
|
||||
CVE-2025-6534,0,0,4aaa4dbea2d1e21bce858b4566e1e92b835724c6fd1a3385ad07ba3ba2aacaa6,2025-06-25T13:15:27.137000
|
||||
@ -299367,8 +299382,8 @@ CVE-2025-6546,0,0,7f4fed601cdb578810dd1a5cedbed6eeb0f6925914143ccccd7f3f890dcfc6
|
||||
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6551,0,0,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000
|
||||
CVE-2025-6552,0,0,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000
|
||||
CVE-2025-6555,0,1,c8debe65f417be0e5f85471b847c080813527a23bda7bdf471c05f76c2540041,2025-06-26T14:15:32.340000
|
||||
CVE-2025-6556,0,1,8a19ef2e594f32189105a51bbaa17de7108727340812df93f9f06f6754c5fa04,2025-06-26T14:15:32.510000
|
||||
CVE-2025-6555,0,0,c8debe65f417be0e5f85471b847c080813527a23bda7bdf471c05f76c2540041,2025-06-26T14:15:32.340000
|
||||
CVE-2025-6556,0,0,8a19ef2e594f32189105a51bbaa17de7108727340812df93f9f06f6754c5fa04,2025-06-26T14:15:32.510000
|
||||
CVE-2025-6557,0,0,9c8d24f715ee56ef9d342378028aa791ae3be74b300c390b225046716ecd370d,2025-06-24T21:15:26.697000
|
||||
CVE-2025-6559,0,0,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000
|
||||
CVE-2025-6560,0,0,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000
|
||||
@ -299403,9 +299418,9 @@ CVE-2025-6616,0,0,69e3d0b87c0a15bcc888ba109078758162c727a166b9e07eb51047379945f9
|
||||
CVE-2025-6617,0,0,69a437ef6870d59f3c2ba3c010071a735995948d72c1f0a5d65bea12dcb87390,2025-06-25T17:15:40.507000
|
||||
CVE-2025-6618,0,0,8f0f71c280554a7c818df3f61621fbe8f744cc190f41ed0b491a2c752a76b10a,2025-06-25T18:15:24.757000
|
||||
CVE-2025-6619,0,0,5c8159eab9352f8a3543f33ff16bfd3dc7f586f658a3ae25f3220f2ef1217cdb,2025-06-25T18:15:24.950000
|
||||
CVE-2025-6620,0,1,7bc5ee9a6c35175ea4c2d789f1d97faf66ba959a6ed15da7fcebe667d5d906ec,2025-06-26T14:15:32.737000
|
||||
CVE-2025-6621,0,1,92ee36f9955ed67d57c6c13f2d4643afe1425501effe00183fb5a52fccd6ca0b,2025-06-26T14:15:32.933000
|
||||
CVE-2025-6624,0,1,07a93b2e9ed3c8caae6323425b398f9c4fc0ffd70646adb166b429f500d00218,2025-06-26T14:15:33.070000
|
||||
CVE-2025-6620,0,0,7bc5ee9a6c35175ea4c2d789f1d97faf66ba959a6ed15da7fcebe667d5d906ec,2025-06-26T14:15:32.737000
|
||||
CVE-2025-6621,0,0,92ee36f9955ed67d57c6c13f2d4643afe1425501effe00183fb5a52fccd6ca0b,2025-06-26T14:15:32.933000
|
||||
CVE-2025-6624,0,0,07a93b2e9ed3c8caae6323425b398f9c4fc0ffd70646adb166b429f500d00218,2025-06-26T14:15:33.070000
|
||||
CVE-2025-6627,0,0,eea8842b3eb9b3e1cf7456e6d24ea2786dc05d22ee014f3051caf23b6445a606,2025-06-25T19:15:24.260000
|
||||
CVE-2025-6640,0,0,d30e371b0ff3d000e15d9a7d1b5a3f5520079493ac68bf58604fe76ee6d72653,2025-06-25T22:15:21.107000
|
||||
CVE-2025-6641,0,0,e8ff4a93ccd27943e33ffe831881654d963aa2f5a55e6036214c79a67b984675,2025-06-25T22:15:21.237000
|
||||
@ -299435,19 +299450,23 @@ CVE-2025-6665,0,0,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf6
|
||||
CVE-2025-6667,0,0,8d9ad53a3335c05cc0865d1435899d49a25a3ca653a61e0fdb6ad611b59d429a,2025-06-25T22:15:24.280000
|
||||
CVE-2025-6668,0,0,b7f7ce19d9ba8dfe1a594307d757f6e849bb60917444403b692842e09544abd4,2025-06-25T22:15:24.450000
|
||||
CVE-2025-6669,0,0,259554a4afe15a633cf6db3e0b294386f75a87b93f6e7e142528c6c7d99925a1,2025-06-25T23:15:21.310000
|
||||
CVE-2025-6674,1,1,330dc93de5a800b119559ce432f3e727a55b7663e61bb6a3f51e753d26da542e,2025-06-26T14:15:34.047000
|
||||
CVE-2025-6675,1,1,d0299463a864b2634b63a6b6631e1d2676a687384aa6c5c64b95b21049704091,2025-06-26T14:15:34.177000
|
||||
CVE-2025-6676,1,1,904b961e1617fc5b434f2a983c54e82fb2b97c2a706594be0f12c0b7f95a3275,2025-06-26T14:15:34.353000
|
||||
CVE-2025-6677,1,1,d64d334c8e0095958043e9bdfe68545d6daf525f06d22d3f20470fe56e37e7db,2025-06-26T14:15:34.540000
|
||||
CVE-2025-6674,0,0,330dc93de5a800b119559ce432f3e727a55b7663e61bb6a3f51e753d26da542e,2025-06-26T14:15:34.047000
|
||||
CVE-2025-6675,0,0,d0299463a864b2634b63a6b6631e1d2676a687384aa6c5c64b95b21049704091,2025-06-26T14:15:34.177000
|
||||
CVE-2025-6676,0,0,904b961e1617fc5b434f2a983c54e82fb2b97c2a706594be0f12c0b7f95a3275,2025-06-26T14:15:34.353000
|
||||
CVE-2025-6677,0,0,d64d334c8e0095958043e9bdfe68545d6daf525f06d22d3f20470fe56e37e7db,2025-06-26T14:15:34.540000
|
||||
CVE-2025-6678,0,0,3d8df884ccaa68204bde970fbc5a3e37b905ea9e2d3ab8e9d4e745c1411dc54e,2025-06-25T18:15:25.507000
|
||||
CVE-2025-6693,0,0,aed7eff55f11f001475fd2a272338716cf45f574b1a0b5d56772bf159d041cf8,2025-06-26T13:15:29.593000
|
||||
CVE-2025-6694,1,1,ee51f17d9ad75bdeb5c5974329bba1fdde90571ade9e0013b45f8ad9f704c57b,2025-06-26T14:15:34.777000
|
||||
CVE-2025-6695,1,1,e535137c3817be7c059c48f3c72b85d7d3d98b1b11478f02b3f20aa6ba18bbdf,2025-06-26T14:15:34.967000
|
||||
CVE-2025-6696,1,1,afc23a687905a86e72dc36166a80d4d75f1137dcb3f841be0fbe42b41be72f13,2025-06-26T15:15:24.633000
|
||||
CVE-2025-6697,1,1,c96659e6099a684ba934d473319311782f9c97ce54ba9ef3bbd88cabdb085dea,2025-06-26T15:15:24.840000
|
||||
CVE-2025-6698,1,1,30941f8dd3b4210c629a7239c4a179665f5aa7c14bb1dd25d45db98f6c1e9093,2025-06-26T15:15:25.023000
|
||||
CVE-2025-6694,0,0,ee51f17d9ad75bdeb5c5974329bba1fdde90571ade9e0013b45f8ad9f704c57b,2025-06-26T14:15:34.777000
|
||||
CVE-2025-6695,0,0,e535137c3817be7c059c48f3c72b85d7d3d98b1b11478f02b3f20aa6ba18bbdf,2025-06-26T14:15:34.967000
|
||||
CVE-2025-6696,0,0,afc23a687905a86e72dc36166a80d4d75f1137dcb3f841be0fbe42b41be72f13,2025-06-26T15:15:24.633000
|
||||
CVE-2025-6697,0,1,85c38d785f5e8c32346e3c53b60a2f8abf1eced95890c1012623934462d0a59f,2025-06-26T16:15:32.560000
|
||||
CVE-2025-6698,0,1,bda5d1b33c6591d4482a182f4472541cfea1ab5eec2230108598768e0855b9c7,2025-06-26T16:15:33.583000
|
||||
CVE-2025-6699,1,1,ddd4793ac17c57a98ce3f46146e63ab05b772593f92021d9b85a82f069096cae,2025-06-26T16:15:34.590000
|
||||
CVE-2025-6700,1,1,d6dd6081fc4a3e628511320526388de82806fe3f1879558f59d2b6fa0bfaac74,2025-06-26T16:15:35.740000
|
||||
CVE-2025-6701,1,1,a3e0912d16ddbd7ead3dd8db87c5dd3a2a97ee56b844df89f0e0b9adfd5dd6e0,2025-06-26T16:15:36.930000
|
||||
CVE-2025-6702,1,1,3142fcdee56d459a72b1ae0d133a9a195a16dcf0120e56e151b74ceb6f8b3871,2025-06-26T16:15:38.033000
|
||||
CVE-2025-6703,0,0,09072c2cd4e411c0d5c8360ca7f6fdefccb20fabc17c8c1696e0829eab242c2a,2025-06-26T10:15:25.950000
|
||||
CVE-2025-6706,1,1,f62ce3759b16005649e600aaa9f5f382173758ca404574900daf66e4ff538bac,2025-06-26T14:15:35.157000
|
||||
CVE-2025-6707,1,1,ec1919161028fcb80da5ac4bad2fe42ce7a27924784bf7ae929f38032df9e6d2,2025-06-26T14:15:35.313000
|
||||
CVE-2025-6709,1,1,7544591fa0466921cddd7453ee0b219f2c7a2f572e56858afaa90ca58a141123,2025-06-26T14:15:35.463000
|
||||
CVE-2025-6710,1,1,1c08e8c79115ef953504d39d589598b5f33f4db72e950ece70cb5bd1de02f4b0,2025-06-26T14:15:35.613000
|
||||
CVE-2025-6706,0,0,f62ce3759b16005649e600aaa9f5f382173758ca404574900daf66e4ff538bac,2025-06-26T14:15:35.157000
|
||||
CVE-2025-6707,0,0,ec1919161028fcb80da5ac4bad2fe42ce7a27924784bf7ae929f38032df9e6d2,2025-06-26T14:15:35.313000
|
||||
CVE-2025-6709,0,0,7544591fa0466921cddd7453ee0b219f2c7a2f572e56858afaa90ca58a141123,2025-06-26T14:15:35.463000
|
||||
CVE-2025-6710,0,0,1c08e8c79115ef953504d39d589598b5f33f4db72e950ece70cb5bd1de02f4b0,2025-06-26T14:15:35.613000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user