From 2a2a2ecd7b9a9d6bea3add44543eec040d6f558e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 26 Jun 2025 18:03:55 +0000 Subject: [PATCH] Auto-Update: 2025-06-26T18:00:18.817510+00:00 --- CVE-2010/CVE-2010-53xx/CVE-2010-5305.json | 11 +- CVE-2019/CVE-2019-65xx/CVE-2019-6535.json | 30 +++- CVE-2023/CVE-2023-470xx/CVE-2023-47029.json | 43 ++++- CVE-2023/CVE-2023-472xx/CVE-2023-47294.json | 43 ++++- CVE-2023/CVE-2023-504xx/CVE-2023-50450.json | 43 ++++- CVE-2024/CVE-2024-529xx/CVE-2024-52928.json | 48 ++++++ CVE-2024/CVE-2024-569xx/CVE-2024-56915.json | 39 ++++- CVE-2025/CVE-2025-275xx/CVE-2025-27587.json | 39 ++++- CVE-2025/CVE-2025-293xx/CVE-2025-29331.json | 39 ++++- CVE-2025/CVE-2025-301xx/CVE-2025-30131.json | 25 +++ CVE-2025/CVE-2025-340xx/CVE-2025-34042.json | 106 ++++++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34043.json | 102 ++++++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34044.json | 102 ++++++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34045.json | 94 +++++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34046.json | 94 +++++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34047.json | 94 +++++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34048.json | 94 +++++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34049.json | 90 ++++++++++ CVE-2025/CVE-2025-360xx/CVE-2025-36034.json | 56 +++++++ CVE-2025/CVE-2025-441xx/CVE-2025-44141.json | 25 +++ CVE-2025/CVE-2025-455xx/CVE-2025-45526.json | 8 +- CVE-2025/CVE-2025-457xx/CVE-2025-45784.json | 71 +++++++- CVE-2025/CVE-2025-461xx/CVE-2025-46109.json | 35 +++- CVE-2025/CVE-2025-461xx/CVE-2025-46157.json | 37 ++++- CVE-2025/CVE-2025-461xx/CVE-2025-46158.json | 43 ++++- CVE-2025/CVE-2025-503xx/CVE-2025-50350.json | 21 +++ CVE-2025/CVE-2025-516xx/CVE-2025-51671.json | 21 +++ CVE-2025/CVE-2025-516xx/CVE-2025-51672.json | 39 ++++- CVE-2025/CVE-2025-524xx/CVE-2025-52477.json | 68 ++++++++ CVE-2025/CVE-2025-52xx/CVE-2025-5209.json | 40 ++++- CVE-2025/CVE-2025-61xx/CVE-2025-6134.json | 83 +++++++++- CVE-2025/CVE-2025-61xx/CVE-2025-6135.json | 89 +++++++++- CVE-2025/CVE-2025-61xx/CVE-2025-6136.json | 83 +++++++++- CVE-2025/CVE-2025-61xx/CVE-2025-6137.json | 72 +++++++- CVE-2025/CVE-2025-61xx/CVE-2025-6139.json | 62 ++++++- CVE-2025/CVE-2025-61xx/CVE-2025-6159.json | 83 +++++++++- CVE-2025/CVE-2025-61xx/CVE-2025-6160.json | 83 +++++++++- CVE-2025/CVE-2025-61xx/CVE-2025-6161.json | 83 +++++++++- CVE-2025/CVE-2025-61xx/CVE-2025-6173.json | 83 +++++++++- CVE-2025/CVE-2025-62xx/CVE-2025-6291.json | 74 ++++++++- CVE-2025/CVE-2025-62xx/CVE-2025-6292.json | 74 ++++++++- CVE-2025/CVE-2025-62xx/CVE-2025-6293.json | 88 +++++++++- CVE-2025/CVE-2025-62xx/CVE-2025-6294.json | 83 +++++++++- CVE-2025/CVE-2025-62xx/CVE-2025-6295.json | 88 +++++++++- CVE-2025/CVE-2025-63xx/CVE-2025-6300.json | 83 +++++++++- CVE-2025/CVE-2025-63xx/CVE-2025-6301.json | 76 ++++++++- CVE-2025/CVE-2025-63xx/CVE-2025-6341.json | 61 ++++++- CVE-2025/CVE-2025-63xx/CVE-2025-6342.json | 87 +++++++++- CVE-2025/CVE-2025-63xx/CVE-2025-6343.json | 87 +++++++++- CVE-2025/CVE-2025-63xx/CVE-2025-6344.json | 87 +++++++++- CVE-2025/CVE-2025-66xx/CVE-2025-6697.json | 10 +- CVE-2025/CVE-2025-66xx/CVE-2025-6698.json | 10 +- CVE-2025/CVE-2025-66xx/CVE-2025-6699.json | 141 ++++++++++++++++ CVE-2025/CVE-2025-67xx/CVE-2025-6700.json | 141 ++++++++++++++++ CVE-2025/CVE-2025-67xx/CVE-2025-6701.json | 137 ++++++++++++++++ CVE-2025/CVE-2025-67xx/CVE-2025-6702.json | 141 ++++++++++++++++ README.md | 104 ++++++------ _state.csv | 173 +++++++++++--------- 58 files changed, 3720 insertions(+), 346 deletions(-) create mode 100644 CVE-2024/CVE-2024-529xx/CVE-2024-52928.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30131.json create mode 100644 CVE-2025/CVE-2025-340xx/CVE-2025-34042.json create mode 100644 CVE-2025/CVE-2025-340xx/CVE-2025-34043.json create mode 100644 CVE-2025/CVE-2025-340xx/CVE-2025-34044.json create mode 100644 CVE-2025/CVE-2025-340xx/CVE-2025-34045.json create mode 100644 CVE-2025/CVE-2025-340xx/CVE-2025-34046.json create mode 100644 CVE-2025/CVE-2025-340xx/CVE-2025-34047.json create mode 100644 CVE-2025/CVE-2025-340xx/CVE-2025-34048.json create mode 100644 CVE-2025/CVE-2025-340xx/CVE-2025-34049.json create mode 100644 CVE-2025/CVE-2025-360xx/CVE-2025-36034.json create mode 100644 CVE-2025/CVE-2025-441xx/CVE-2025-44141.json create mode 100644 CVE-2025/CVE-2025-503xx/CVE-2025-50350.json create mode 100644 CVE-2025/CVE-2025-516xx/CVE-2025-51671.json create mode 100644 CVE-2025/CVE-2025-524xx/CVE-2025-52477.json create mode 100644 CVE-2025/CVE-2025-66xx/CVE-2025-6699.json create mode 100644 CVE-2025/CVE-2025-67xx/CVE-2025-6700.json create mode 100644 CVE-2025/CVE-2025-67xx/CVE-2025-6701.json create mode 100644 CVE-2025/CVE-2025-67xx/CVE-2025-6702.json diff --git a/CVE-2010/CVE-2010-53xx/CVE-2010-5305.json b/CVE-2010/CVE-2010-53xx/CVE-2010-5305.json index 0a386808531..c0c7d600489 100644 --- a/CVE-2010/CVE-2010-53xx/CVE-2010-5305.json +++ b/CVE-2010/CVE-2010-53xx/CVE-2010-5305.json @@ -2,7 +2,7 @@ "id": "CVE-2010-5305", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2019-03-26T18:29:00.263", - "lastModified": "2025-04-14T22:15:15.097", + "lastModified": "2025-06-26T17:15:28.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -159,13 +159,8 @@ ], "references": [ { - "url": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Mitigation", - "Third Party Advisory", - "US Government Resource" - ] + "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/66684/kw/vulnerability/r_id/115100", + "source": "ics-cert@hq.dhs.gov" }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-10-070-02", diff --git a/CVE-2019/CVE-2019-65xx/CVE-2019-6535.json b/CVE-2019/CVE-2019-65xx/CVE-2019-6535.json index 11e288dff2f..687e1463697 100644 --- a/CVE-2019/CVE-2019-65xx/CVE-2019-6535.json +++ b/CVE-2019/CVE-2019-65xx/CVE-2019-6535.json @@ -2,7 +2,7 @@ "id": "CVE-2019-6535", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2019-02-05T19:29:00.243", - "lastModified": "2024-11-21T04:46:38.847", + "lastModified": "2025-06-26T17:15:29.873", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "nvd@nist.gov", "type": "Primary", @@ -602,12 +622,8 @@ ] }, { - "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-029-02", + "source": "ics-cert@hq.dhs.gov" }, { "url": "http://www.securityfocus.com/bid/106771", diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47029.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47029.json index a8dcf890751..737464ae617 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47029.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47029.json @@ -2,16 +2,55 @@ "id": "CVE-2023-47029", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T18:15:20.630", - "lastModified": "2025-06-23T20:16:21.633", + "lastModified": "2025-06-26T16:15:24.467", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via a crafted POST request to the UserService component" + }, + { + "lang": "es", + "value": "Un problema en NCR Terminal Handler v.1.5.1 permite que un atacante remoto ejecute c\u00f3digo arbitrario y obtenga informaci\u00f3n confidencial a trav\u00e9s de una solicitud POST manipulada para el componente UserService." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://drive.google.com/file/d/1oX5uKnWGiYMaBxnBuqPiOA53XLxv1Ef4/view?usp=sharing", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47294.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47294.json index 0cae5595967..d19d94a743a 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47294.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47294.json @@ -2,16 +2,55 @@ "id": "CVE-2023-47294", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T16:15:24.493", - "lastModified": "2025-06-23T20:16:21.633", + "lastModified": "2025-06-26T16:15:25.483", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in NCR Terminal Handler v1.5.1 allows low-level privileged authenticated attackers to arbitrarily deactivate, lock, and delete user accounts via a crafted session cookie." + }, + { + "lang": "es", + "value": "Un problema en NCR Terminal Handler v1.5.1 permite que atacantes autenticados con privilegios de bajo nivel desactiven, bloqueen y eliminen arbitrariamente cuentas de usuario a trav\u00e9s de una cookie de sesi\u00f3n manipulada espec\u00edficamente." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://drive.google.com/file/d/1owG3_2oVpoCb34Mb7nCYZNrjW8cFxpzN/view?usp=sharing", diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50450.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50450.json index c72b262adc5..8b425ba9aba 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50450.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50450.json @@ -2,16 +2,55 @@ "id": "CVE-2023-50450", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T16:15:24.743", - "lastModified": "2025-06-23T20:16:21.633", + "lastModified": "2025-06-26T16:15:25.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sensopart VISOR Vision Sensors before 2.10.0.2 allows local users to perform unspecified actions with elevated privileges." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Sensopart VISOR Vision Sensors anteriores a 2.10.0.2 que permit\u00eda a los usuarios locales realizar acciones no especificadas con privilegios elevados." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://code-white.com/public-vulnerability-list/", diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52928.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52928.json new file mode 100644 index 00000000000..27bee25e998 --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52928.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-52928", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-26T17:15:30.287", + "lastModified": "2025-06-26T17:15:30.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with previously granted permissions) to add new permissions when the user clicks anywhere on the website." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://arc.net/security/bulletins#windows-site-settings-bypass-cve-2024-52928", + "source": "cve@mitre.org" + }, + { + "url": "https://thebrowser.company", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56915.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56915.json index d4f1a3136cd..af82a50e250 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56915.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56915.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56915", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-26T15:15:22.570", - "lastModified": "2025-06-26T15:15:22.570", + "lastModified": "2025-06-26T16:15:25.910", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Netbox Community v4.1.7 and fixed in v.4.2.2 is vulnerable to Cross Site Scripting (XSS) via the RSS feed widget." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7", diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27587.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27587.json index db2f0aab9f9..66ce0175cf2 100644 --- a/CVE-2025/CVE-2025-275xx/CVE-2025-27587.json +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27587.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27587", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-16T22:15:44.093", - "lastModified": "2025-06-17T20:50:23.507", + "lastModified": "2025-06-26T17:15:30.497", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "OpenSSL 3.0.0 a 3.3.2 en la arquitectura PowerPC es vulnerable a un ataque Minerva. Este ataque se puede explotar midiendo el tiempo de firma de mensajes aleatorios mediante la API EVP_DigestSign y, posteriormente, utilizando la clave privada para extraer el valor K (nonce) de las firmas. A continuaci\u00f3n, bas\u00e1ndose en el tama\u00f1o en bits del nonce extra\u00eddo, se puede comparar el tiempo de firma de nonces de tama\u00f1o completo con el de firmas que utilizan nonces m\u00e1s peque\u00f1os mediante pruebas estad\u00edsticas. Existe un canal lateral en la curva P-364 que permite la extracci\u00f3n de la clave privada (adem\u00e1s, existe una dependencia entre el tama\u00f1o en bits de K y el tama\u00f1o del canal lateral). NOTA: Esta CVE es controvertida porque la pol\u00edtica de seguridad de OpenSSL indica expl\u00edcitamente que cualquier canal lateral que requiera la detecci\u00f3n del mismo sistema f\u00edsico queda fuera del modelo de amenazas del software. La se\u00f1al de tiempo es tan peque\u00f1a que es imposible detectarla sin que el proceso atacante se ejecute en el mismo sistema f\u00edsico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-385" + } + ] + } + ], "references": [ { "url": "https://github.com/openssl/openssl/issues/24253", diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29331.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29331.json index 85936cffd29..aee99c75069 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29331.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29331.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29331", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-26T15:15:22.690", - "lastModified": "2025-06-26T15:15:22.690", + "lastModified": "2025-06-26T16:15:26.300", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in MHSanaei 3x-ui before v.2.5.3 and before allows a remote attacker to execute arbitrary code via the management script x-ui passes the no check certificate option to wget when downloading updates" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], "references": [ { "url": "https://github.com/MHSanaei/3x-ui/pull/2661", diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30131.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30131.json new file mode 100644 index 00000000000..e94b78f890e --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30131.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30131", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-26T17:15:30.743", + "lastModified": "2025-06-26T17:15:30.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on IROAD Dashcam FX2 devices. An unauthenticated file upload endpoint can be leveraged to execute arbitrary commands by uploading a CGI-based webshell. Once a file is uploaded, the attacker can execute commands with root privileges, gaining full control over the dashcam. Additionally, by uploading a netcat (nc) binary, the attacker can establish a reverse shell, maintaining persistent remote and privileged access to the device. This allows complete device takeover." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-11---cve-2025-30131-unrestricted-webshell", + "source": "cve@mitre.org" + }, + { + "url": "https://www.iroadau.com.au/downloads/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34042.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34042.json new file mode 100644 index 00000000000..36f7c2a07f6 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34042.json @@ -0,0 +1,106 @@ +{ + "id": "CVE-2025-34042", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-26T16:15:27.197", + "lastModified": "2025-06-26T16:15:27.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated command injection vulnerability exists in the Beward N100 IP Camera firmware version M2.1.6.04C014 via the ServerName and TimeZone parameters in the servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands into these parameters, which are unsafely embedded into backend system calls without proper input sanitization. Successful exploitation results in remote code execution with root privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://cxsecurity.com/issue/WLB-2019020042", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://packetstorm.news/files/id/151531", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://s4e.io/tools/beward-n100-h264-vga-ip-camera-arbitrary-file-disclosure", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/beward-n100-remote-command-execution", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.beward.net", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.fortiguard.com/encyclopedia/ips/48618", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5512.php", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34043.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34043.json new file mode 100644 index 00000000000..d8dde36afb1 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34043.json @@ -0,0 +1,102 @@ +{ + "id": "CVE-2025-34043", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-26T16:15:27.490", + "lastModified": "2025-06-26T16:15:27.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A remote command injection vulnerability exists in Vacron Network Video Recorder (NVR) devices v1.4 due to improper input sanitization in the board.cgi script. The vulnerability allows unauthenticated attackers to pass arbitrary commands to the underlying operating system via crafted HTTP requests. These commands are executed with the privileges of the web server process, enabling remote code execution and potential full device compromise." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/vacron-nvr-remote-command-execution", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=30386", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.sonicwall.com/blog/vacron-network-video-recorder-remote-command-execution", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.tenable.com/plugins/nessus/104124", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.vacron.com/", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34044.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34044.json new file mode 100644 index 00000000000..36838685135 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34044.json @@ -0,0 +1,102 @@ +{ + "id": "CVE-2025-34044", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-26T16:15:27.670", + "lastModified": "2025-06-26T16:15:27.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A remote command injection vulnerability exists in the confirm.php interface of the WIFISKY 7-layer Flow Control Router via a specially-crafted HTTP GET request to the t parameter. Insufficient input validation allows unauthenticated attackers to execute arbitrary OS commands." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "http://www.szwifisky.com/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/other/wifisky7-rce.yaml", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/wifisky-flow-control-router-rce", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-45363", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.variotdbs.pl/vuln/VAR-202107-1715/", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34045.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34045.json new file mode 100644 index 00000000000..29957cb8246 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34045.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-34045", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-26T16:15:27.830", + "lastModified": "2025-06-26T16:15:27.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2020/CNVD-2020-68596.yaml", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/weiphp-path-traversal-file-read", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2020-68596", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34046.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34046.json new file mode 100644 index 00000000000..509f95e1f2b --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34046.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-34046", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-26T16:15:27.987", + "lastModified": "2025-06-26T16:15:27.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated file upload vulnerability exists in the Fanwei E-Office <= v9.4 web management interface. The vulnerability affects the /general/index/UploadFile.php endpoint, which improperly validates uploaded files when invoked with certain parameters (uploadType=eoffice_logo or uploadType=theme). An attacker can exploit this flaw by sending a crafted HTTP POST request to upload arbitrary files without requiring authentication. Successful exploitation could enable remote code execution on the affected server, leading to complete compromise of the web application and potentially the underlying system." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/M0ge/CNVD-2021-49104-Fanwei-Eoffice-fileupload/blob/main/eoffice_fileupload.py", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2021/CNVD-2021-49104.yaml", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/fanwei-eoffice-file-upload", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-49104", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34047.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34047.json new file mode 100644 index 00000000000..dc00b345524 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34047.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-34047", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-26T16:15:28.140", + "lastModified": "2025-06-26T16:15:28.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability exists in the Leadsec SSL VPN (formerly Lenovo NetGuard), allowing unauthenticated attackers to read arbitrary files on the underlying system via the ostype parameter in the /vpn/user/download/client endpoint. This flaw arises from insufficient input sanitation, enabling traversal sequences\u00a0to escape the intended directory and access sensitive files." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2021/CNVD-2021-64035.yaml", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/leadsec-vpn-path-traversal-file-read", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-64035", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.leadsec.com.cn/", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34048.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34048.json new file mode 100644 index 00000000000..daa062d80e8 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34048.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-34048", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-26T16:15:28.273", + "lastModified": "2025-06-26T16:15:28.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/threat9/routersploit/blob/master/routersploit/modules/exploits/routers/dlink/dsl_2730_2750_path_traversal.py", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/dlink-dsl-routers-path-traversal-file-read", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.dlink.com", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/40735", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34049.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34049.json new file mode 100644 index 00000000000..87e94065007 --- /dev/null +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34049.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-34049", + "sourceIdentifier": "disclosure@vulncheck.com", + "published": "2025-06-26T16:15:28.413", + "lastModified": "2025-06-26T16:15:28.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability exists in the OptiLink ONT1GEW GPON router firmware version V2.1.11_X101 Build 1127.190306 and earlier. The router\u2019s web management interface fails to properly sanitize user input in the target_addr parameter of the formTracert and formPing administrative endpoints. An authenticated attacker can inject arbitrary operating system commands, which are executed with root privileges, leading to remote code execution. Successful exploitation enables full compromise of the device." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@vulncheck.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://optilinknetwork.com/", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://vulncheck.com/advisories/optilink-ont1gew-router-rce", + "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/49955", + "source": "disclosure@vulncheck.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-360xx/CVE-2025-36034.json b/CVE-2025/CVE-2025-360xx/CVE-2025-36034.json new file mode 100644 index 00000000000..d7d686616d4 --- /dev/null +++ b/CVE-2025/CVE-2025-360xx/CVE-2025-36034.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-36034", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-06-26T16:15:28.567", + "lastModified": "2025-06-26T16:15:28.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7237604", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-441xx/CVE-2025-44141.json b/CVE-2025/CVE-2025-441xx/CVE-2025-44141.json new file mode 100644 index 00000000000..1e96c0d4122 --- /dev/null +++ b/CVE-2025/CVE-2025-441xx/CVE-2025-44141.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-44141", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-26T16:15:28.753", + "lastModified": "2025-06-26T16:15:28.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Scripting (XSS) vulnerability exists in the node creation form of Backdrop CMS 1.30." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://backdrop.com", + "source": "cve@mitre.org" + }, + { + "url": "https://scandalous-author-611.notion.site/CVE-2025-44141-21d29577f39e802480a2efab13e66c61", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-455xx/CVE-2025-45526.json b/CVE-2025/CVE-2025-455xx/CVE-2025-45526.json index 37a917f3f69..d55bc1190bc 100644 --- a/CVE-2025/CVE-2025-455xx/CVE-2025-45526.json +++ b/CVE-2025/CVE-2025-455xx/CVE-2025-45526.json @@ -2,7 +2,7 @@ "id": "CVE-2025-45526", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-17T20:15:32.243", - "lastModified": "2025-06-18T19:15:21.853", + "lastModified": "2025-06-26T16:15:29.013", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -49,7 +49,7 @@ "weaknesses": [ { "source": "cve@mitre.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -66,6 +66,10 @@ { "url": "https://github.com/github/advisory-database/pull/5730", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/Rootingg/483b09b760d031b62b172f2153f3ed2a", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-457xx/CVE-2025-45784.json b/CVE-2025/CVE-2025-457xx/CVE-2025-45784.json index ea1b0566bb6..be18f594fdc 100644 --- a/CVE-2025/CVE-2025-457xx/CVE-2025-45784.json +++ b/CVE-2025/CVE-2025-457xx/CVE-2025-45784.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45784", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-18T14:15:44.553", - "lastModified": "2025-06-18T15:15:26.710", - "vulnStatus": "Received", + "lastModified": "2025-06-26T15:54:43.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:d-link:dph-400se_firmware:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1C5562F5-D61A-4D1F-B899-0C6EEC46DBEF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:d-link:dph-400se:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E5534B1-36A0-4CC4-A3D4-5BB69026EA51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:d-link:dph-400s_firmware:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "88E473A7-5416-4273-B07C-F8A95C6F3E9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:d-link:dph-400s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AEF259E-170D-4061-A011-40C16DED82AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://cybermaya.in/posts/Post-37/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46109.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46109.json index 9591793b199..4194490ab59 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46109.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46109.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46109", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-18T15:15:27.430", - "lastModified": "2025-06-18T16:15:27.607", - "vulnStatus": "Received", + "lastModified": "2025-06-26T15:51:06.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pbootcms:pbootcms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2.5", + "versionEndIncluding": "3.2.10", + "matchCriteriaId": "44A4044B-0AD2-4EF8-9922-E7551D9550D4" + } + ] + } + ] + } + ], "references": [ { "url": "http://cocr.cc/2025/04/17/pbootcms/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/pbootcmspro/PbootCMS/issues/22", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46157.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46157.json index 4c8c9ff45d7..29296bd1cd3 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46157.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46157.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46157", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-18T14:15:44.687", - "lastModified": "2025-06-18T14:15:44.687", - "vulnStatus": "Received", + "lastModified": "2025-06-26T15:53:12.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:efrotech:timetrax:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6B0950-B7A3-4F00-9572-CD0754B60859" + } + ] + } + ] + } + ], "references": [ { "url": "http://efrotech.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://timetrax.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/morphine009/CVE-2025-46157", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46158.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46158.json index 52a6d0d4a36..2d1841e26e8 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46158.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46158.json @@ -2,7 +2,7 @@ "id": "CVE-2025-46158", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-20T18:15:28.440", - "lastModified": "2025-06-23T20:16:21.633", + "lastModified": "2025-06-26T16:15:30.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el kernel de redoxOS antes del commit 5d41cd7c permite que un atacante local provoque una denegaci\u00f3n de servicio a trav\u00e9s de la llamada al sistema `setitimer`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], "references": [ { "url": "https://github.com/Marsman1996/pocs/tree/master/redox/CVE-2025-46158", @@ -28,6 +63,10 @@ { "url": "https://gitlab.redox-os.org/redox-os/kernel/-/merge_requests/386", "source": "cve@mitre.org" + }, + { + "url": "https://gitlab.redox-os.org/redox-os/kernel/-/issues/164", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-503xx/CVE-2025-50350.json b/CVE-2025/CVE-2025-503xx/CVE-2025-50350.json new file mode 100644 index 00000000000..0d3dae85f84 --- /dev/null +++ b/CVE-2025/CVE-2025-503xx/CVE-2025-50350.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-50350", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-26T16:15:30.980", + "lastModified": "2025-06-26T16:15:30.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPGurukul Pre-School Enrollment System Project v1.0 is vulnerable to Directory Traversal in manage-classes.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-516xx/CVE-2025-51671.json b/CVE-2025/CVE-2025-516xx/CVE-2025-51671.json new file mode 100644 index 00000000000..eea23d99185 --- /dev/null +++ b/CVE-2025/CVE-2025-516xx/CVE-2025-51671.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-51671", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-26T16:15:31.147", + "lastModified": "2025-06-26T16:15:31.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability was discovered in the PHPGurukul Dairy Farm Shop Management System 1.3. The vulnerability allows remote attackers to execute arbitrary SQL code via the category and categorycode parameters in a POST request to the manage-categories.php file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Dairy-Farm-Shop-Management-System/SQL/SQL_injection_edit-category.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-516xx/CVE-2025-51672.json b/CVE-2025/CVE-2025-516xx/CVE-2025-51672.json index d2576d53d86..77f234eb51c 100644 --- a/CVE-2025/CVE-2025-516xx/CVE-2025-51672.json +++ b/CVE-2025/CVE-2025-516xx/CVE-2025-51672.json @@ -2,7 +2,7 @@ "id": "CVE-2025-51672", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-26T15:15:23.140", - "lastModified": "2025-06-26T15:15:23.140", + "lastModified": "2025-06-26T16:15:31.347", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A time-based blind SQL injection vulnerability was identified in the PHPGurukul Dairy Farm Shop Management System 1.3. The vulnerability exists in the manage-companies.php file and allows remote attackers to execute arbitrary SQL code via the companyname parameter in a POST request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Dairy-Farm-Shop-Management-System/SQL/SQL_injection_edit-company.md", diff --git a/CVE-2025/CVE-2025-524xx/CVE-2025-52477.json b/CVE-2025/CVE-2025-524xx/CVE-2025-52477.json new file mode 100644 index 00000000000..36687835422 --- /dev/null +++ b/CVE-2025/CVE-2025-524xx/CVE-2025-52477.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-52477", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-26T17:15:30.897", + "lastModified": "2025-06-26T17:15:30.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/octo-sts/app/commit/0f177fde54f9318e33f0bba6abaea9463a7c3afd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/octo-sts/app/commit/b3976e39bd8c8c217c0670747d34a4499043da92", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/octo-sts/app/security/advisories/GHSA-h3qp-hwvr-9xcq", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/octo-sts/app/security/advisories/GHSA-h3qp-hwvr-9xcq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5209.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5209.json index 5196cfd429a..279ee857247 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5209.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5209.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5209", "sourceIdentifier": "contact@wpscan.com", "published": "2025-06-17T06:15:21.870", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:01:40.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivorysearch:ivory_search:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.5.10", + "matchCriteriaId": "22748013-0B1D-4F84-B054-175E592B407B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/8b51dc46-62c8-45b5-96ce-fb774b430388/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6134.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6134.json index 344cc6f29e6..ab30e88de80 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6134.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6134.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6134", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T19:15:34.633", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:46:43.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertClient_client_id.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertClient_client_id.md#poc", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312603", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312603", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592839", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6135.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6135.json index 36de7051ad8..5bdee7ec9e0 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6135.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6135.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6135", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T19:15:34.850", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:44:08.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_client_id.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_nominee_id.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312604", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312604", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592840", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592841", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6136.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6136.json index bec1d5bdee2..bbad445cfe9 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6136.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6136.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6136", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T20:15:27.863", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:37:17.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md#poc", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312605", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312605", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592842", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6137.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6137.json index bb95925b4ee..c1f0510fe0e 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6137.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6137.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6137", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T20:15:28.040", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:33:18.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,86 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:*", + "matchCriteriaId": "827828BD-015A-458C-8E00-37B2BF489F2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D751C3BC-20DC-4896-B334-EE3A00F600BF" + } + ] + } + ] } ], "references": [ { "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiScheduleCfg-20ddf0aa11858053a171f052787c202f", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312606", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312606", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592911", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6139.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6139.json index 5c5c481512b..4fd30092310 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6139.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6139.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6139", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T21:15:24.513", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:27:37.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -120,26 +120,74 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:*", + "matchCriteriaId": "827828BD-015A-458C-8E00-37B2BF489F2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D751C3BC-20DC-4896-B334-EE3A00F600BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-shadow-20ddf0aa118580f5a455cd5dbc521472", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312608", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312608", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.592922", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6159.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6159.json index db4dbe60570..45bd67d1407 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6159.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6159.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6159", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T04:15:56.140", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:21:06.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Aalok-zz/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312634", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312634", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593177", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6160.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6160.json index 678af214e7c..acd3aee7646 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6160.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6160.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6160", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T05:15:21.567", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:15:47.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sourcecodester:downloading_client_database_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9C3702A6-BD59-4AF1-B3FD-5EF35EA9D00D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/yitianweiming/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312635", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312635", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593216", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6161.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6161.json index b9d8e33f61b..2e20804444f 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6161.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6161.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6161", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T05:15:21.833", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T16:04:27.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_food_ordering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D2178235-ED8E-4C5D-90E4-C276B189FB36" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/kakalalaww/CVE/issues/17", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312636", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312636", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593237", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6173.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6173.json index cf55fbc356b..97c37b64981 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6173.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6173.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6173", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T07:15:18.630", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-26T15:57:47.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webkul:qloapps:1.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A58133B7-029B-4E77-8470-C28C0F8CBC35" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/caigo8/CVE-md/blob/main/QloApps/SQL_Injection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/caigo8/CVE-md/blob/main/QloApps/SQL_Injection.md#vulnerability-recurrence", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.312661", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312661", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593679", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6291.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6291.json index 84b81e8f9dd..a4d6eede06e 100644 --- a/CVE-2025/CVE-2025-62xx/CVE-2025-6291.json +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6291.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6291", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T01:15:39.067", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T17:00:25.153", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -131,34 +131,90 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-825_firmware:2.03:*:*:*:*:*:*:*", + "matchCriteriaId": "16B2A1A7-07D5-4D0D-9EFC-AA89C1D1B67A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7038F8A9-03F3-4442-B371-84801EF05447" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink#poc", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313293", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313293", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593937", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6292.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6292.json index a89cd0ba758..4189e2089fb 100644 --- a/CVE-2025/CVE-2025-62xx/CVE-2025-6292.json +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6292.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6292", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T01:15:39.257", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T17:25:51.993", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -131,34 +131,90 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-825_firmware:2.03:*:*:*:*:*:*:*", + "matchCriteriaId": "16B2A1A7-07D5-4D0D-9EFC-AA89C1D1B67A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7038F8A9-03F3-4442-B371-84801EF05447" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC#poc", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313294", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313294", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593938", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6293.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6293.json index c5680b4f127..8dbbe8550e6 100644 --- a/CVE-2025/CVE-2025-62xx/CVE-2025-6293.json +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6293.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6293", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T01:15:39.447", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T17:22:14.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1xxxgg/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313295", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313295", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593996", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/1xxxgg/cve/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6294.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6294.json index 47b1595b13f..182be5e752a 100644 --- a/CVE-2025/CVE-2025-62xx/CVE-2025-6294.json +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6294.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6294", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T01:15:39.630", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T17:21:26.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1xxxgg/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313296", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313296", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593997", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6295.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6295.json index 24047d8cf76..5aca5e58e2b 100644 --- a/CVE-2025/CVE-2025-62xx/CVE-2025-6295.json +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6295.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6295", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T02:15:21.020", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T17:19:48.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1xxxgg/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313297", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313297", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593998", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/1xxxgg/cve/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6300.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6300.json index 8e2a3e319d9..450dec5001b 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6300.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6300.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6300", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T03:15:28.243", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T17:14:20.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/GarminYoung/myCVE/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313300", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313300", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.595366", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6301.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6301.json index c7933d0b81d..0cae2ab70e6 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6301.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6301.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6301", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T03:15:28.420", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T17:09:26.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,24 +142,66 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anujk305:notice_board_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D07C17AC-0890-411C-8BAF-35EFDD134BAD" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313301", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313301", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.595373", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6341.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6341.json index 092c61d0c31..cd9c3f11d76 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6341.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6341.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6341", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T13:15:19.980", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-26T17:31:18.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,75 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabian:school_fees_payment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA0F147-F254-4156-BAB0-6D889FEEEC1C" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/tuooo/CVE/issues/15", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313336", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313336", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.597023", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6342.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6342.json index 432a32c65c8..c07c754a533 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6342.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6342.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6342", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T14:15:32.260", - "lastModified": "2025-06-20T14:15:32.260", - "vulnStatus": "Received", + "lastModified": "2025-06-26T15:43:29.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. This issue affects some unknown processing of the file /admin/admin_football.php. The manipulation of the argument pid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Este problema afecta a un procesamiento desconocido del archivo /admin/admin_football.php. La manipulaci\u00f3n del argumento pid provoca una inyecci\u00f3n SQL. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ltranquility/CVE/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313337", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313337", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.597043", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6343.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6343.json index 5343e13da04..1494a91ca00 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6343.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6343.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6343", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T14:15:32.667", - "lastModified": "2025-06-20T14:15:32.667", - "vulnStatus": "Received", + "lastModified": "2025-06-26T15:41:01.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Online Shoe Store 1.0. Affected is an unknown function of the file /admin/admin_product.php. The manipulation of the argument pid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/admin_product.php. La manipulaci\u00f3n del argumento pid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ltranquility/CVE/issues/6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313338", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313338", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.597044", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-63xx/CVE-2025-6344.json b/CVE-2025/CVE-2025-63xx/CVE-2025-6344.json index 52bdaeda6c8..f774480e73f 100644 --- a/CVE-2025/CVE-2025-63xx/CVE-2025-6344.json +++ b/CVE-2025/CVE-2025-63xx/CVE-2025-6344.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6344", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-20T14:15:32.970", - "lastModified": "2025-06-20T14:15:32.970", - "vulnStatus": "Received", + "lastModified": "2025-06-26T15:38:17.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in code-projects Online Shoe Store 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /contactus.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Online Shoe Store 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /contactus.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ltranquility/CVE/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.313339", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.313339", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.597045", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6697.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6697.json index 736306b325c..4c39382f6cc 100644 --- a/CVE-2025/CVE-2025-66xx/CVE-2025-6697.json +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6697.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6697", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-26T15:15:24.840", - "lastModified": "2025-06-26T15:15:24.840", + "lastModified": "2025-06-26T16:15:32.560", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.597386", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.597386", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6698.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6698.json index bf50c0e6689..d86ddd86d73 100644 --- a/CVE-2025/CVE-2025-66xx/CVE-2025-6698.json +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6698.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6698", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-26T15:15:25.023", - "lastModified": "2025-06-26T15:15:25.023", + "lastModified": "2025-06-26T16:15:33.583", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.597389", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.597389", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6699.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6699.json new file mode 100644 index 00000000000..ca246f37a9c --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6699.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6699", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-26T16:15:34.590", + "lastModified": "2025-06-26T16:15:34.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in LabRedesCefetRJ WeGIA 3.4.0. This affects an unknown part of the file /html/funcionario/cadastro_funcionario.php of the component Cadastro de Funcion\u00e1rio. The manipulation of the argument Nome/Sobrenome leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This is a different issue than CVE-2025-23030. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README7.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313965", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313965", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.597401", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6700.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6700.json new file mode 100644 index 00000000000..9f95b5234e0 --- /dev/null +++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6700.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6700", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-26T16:15:35.740", + "lastModified": "2025-06-26T16:15:35.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Xuxueli xxl-sso 1.1.0. This vulnerability affects unknown code of the file /xxl-sso-server/login. The manipulation of the argument errorMsg leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-01/report.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313966", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313966", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.597456", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6701.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6701.json new file mode 100644 index 00000000000..e676b55dba6 --- /dev/null +++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6701.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-6701", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-26T16:15:36.930", + "lastModified": "2025-06-26T16:15:36.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in Xuxueli xxl-sso 1.1.0. This issue affects some unknown processing of the file /xxl-sso-server/doLogin. The manipulation of the argument redirect_url leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-02.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313967", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313967", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.597472", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6702.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6702.json new file mode 100644 index 00000000000..fdfc6f08113 --- /dev/null +++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6702.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6702", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-26T16:15:38.033", + "lastModified": "2025-06-26T16:15:38.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in linlinjava litemall 1.8.0. Affected is an unknown function of the file /wx/comment/post. The manipulation of the argument adminComment leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://ctf-n0el4kls.notion.site/Litemall-Mass-Assignment-Vulnerability-in-wx-comment-post-21441990f447808b86d1cb15e37ecae9?source=copy_link", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313968", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313968", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.597473", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 50e238eb31b..b9bc27ca2a4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-26T16:00:26.737438+00:00 +2025-06-26T18:00:18.817510+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-26T15:35:49.490000+00:00 +2025-06-26T17:31:18.840000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299452 +299471 ``` ### CVEs added in the last Commit -Recently added CVEs: `27` +Recently added CVEs: `19` -- [CVE-2025-48921](CVE-2025/CVE-2025-489xx/CVE-2025-48921.json) (`2025-06-26T14:15:30.043`) -- [CVE-2025-48922](CVE-2025/CVE-2025-489xx/CVE-2025-48922.json) (`2025-06-26T14:15:30.180`) -- [CVE-2025-48923](CVE-2025/CVE-2025-489xx/CVE-2025-48923.json) (`2025-06-26T14:15:30.300`) -- [CVE-2025-49003](CVE-2025/CVE-2025-490xx/CVE-2025-49003.json) (`2025-06-26T14:15:30.433`) -- [CVE-2025-51672](CVE-2025/CVE-2025-516xx/CVE-2025-51672.json) (`2025-06-26T15:15:23.140`) -- [CVE-2025-52573](CVE-2025/CVE-2025-525xx/CVE-2025-52573.json) (`2025-06-26T14:15:30.577`) -- [CVE-2025-52887](CVE-2025/CVE-2025-528xx/CVE-2025-52887.json) (`2025-06-26T15:15:23.350`) -- [CVE-2025-52900](CVE-2025/CVE-2025-529xx/CVE-2025-52900.json) (`2025-06-26T15:15:23.520`) -- [CVE-2025-52902](CVE-2025/CVE-2025-529xx/CVE-2025-52902.json) (`2025-06-26T15:15:23.687`) -- [CVE-2025-53002](CVE-2025/CVE-2025-530xx/CVE-2025-53002.json) (`2025-06-26T15:15:23.873`) -- [CVE-2025-53007](CVE-2025/CVE-2025-530xx/CVE-2025-53007.json) (`2025-06-26T15:15:24.043`) -- [CVE-2025-5682](CVE-2025/CVE-2025-56xx/CVE-2025-5682.json) (`2025-06-26T14:15:31.280`) -- [CVE-2025-6674](CVE-2025/CVE-2025-66xx/CVE-2025-6674.json) (`2025-06-26T14:15:34.047`) -- [CVE-2025-6675](CVE-2025/CVE-2025-66xx/CVE-2025-6675.json) (`2025-06-26T14:15:34.177`) -- [CVE-2025-6676](CVE-2025/CVE-2025-66xx/CVE-2025-6676.json) (`2025-06-26T14:15:34.353`) -- [CVE-2025-6677](CVE-2025/CVE-2025-66xx/CVE-2025-6677.json) (`2025-06-26T14:15:34.540`) -- [CVE-2025-6694](CVE-2025/CVE-2025-66xx/CVE-2025-6694.json) (`2025-06-26T14:15:34.777`) -- [CVE-2025-6695](CVE-2025/CVE-2025-66xx/CVE-2025-6695.json) (`2025-06-26T14:15:34.967`) -- [CVE-2025-6696](CVE-2025/CVE-2025-66xx/CVE-2025-6696.json) (`2025-06-26T15:15:24.633`) -- [CVE-2025-6697](CVE-2025/CVE-2025-66xx/CVE-2025-6697.json) (`2025-06-26T15:15:24.840`) -- [CVE-2025-6698](CVE-2025/CVE-2025-66xx/CVE-2025-6698.json) (`2025-06-26T15:15:25.023`) -- [CVE-2025-6706](CVE-2025/CVE-2025-67xx/CVE-2025-6706.json) (`2025-06-26T14:15:35.157`) -- [CVE-2025-6707](CVE-2025/CVE-2025-67xx/CVE-2025-6707.json) (`2025-06-26T14:15:35.313`) -- [CVE-2025-6709](CVE-2025/CVE-2025-67xx/CVE-2025-6709.json) (`2025-06-26T14:15:35.463`) -- [CVE-2025-6710](CVE-2025/CVE-2025-67xx/CVE-2025-6710.json) (`2025-06-26T14:15:35.613`) +- [CVE-2024-52928](CVE-2024/CVE-2024-529xx/CVE-2024-52928.json) (`2025-06-26T17:15:30.287`) +- [CVE-2025-30131](CVE-2025/CVE-2025-301xx/CVE-2025-30131.json) (`2025-06-26T17:15:30.743`) +- [CVE-2025-34042](CVE-2025/CVE-2025-340xx/CVE-2025-34042.json) (`2025-06-26T16:15:27.197`) +- [CVE-2025-34043](CVE-2025/CVE-2025-340xx/CVE-2025-34043.json) (`2025-06-26T16:15:27.490`) +- [CVE-2025-34044](CVE-2025/CVE-2025-340xx/CVE-2025-34044.json) (`2025-06-26T16:15:27.670`) +- [CVE-2025-34045](CVE-2025/CVE-2025-340xx/CVE-2025-34045.json) (`2025-06-26T16:15:27.830`) +- [CVE-2025-34046](CVE-2025/CVE-2025-340xx/CVE-2025-34046.json) (`2025-06-26T16:15:27.987`) +- [CVE-2025-34047](CVE-2025/CVE-2025-340xx/CVE-2025-34047.json) (`2025-06-26T16:15:28.140`) +- [CVE-2025-34048](CVE-2025/CVE-2025-340xx/CVE-2025-34048.json) (`2025-06-26T16:15:28.273`) +- [CVE-2025-34049](CVE-2025/CVE-2025-340xx/CVE-2025-34049.json) (`2025-06-26T16:15:28.413`) +- [CVE-2025-36034](CVE-2025/CVE-2025-360xx/CVE-2025-36034.json) (`2025-06-26T16:15:28.567`) +- [CVE-2025-44141](CVE-2025/CVE-2025-441xx/CVE-2025-44141.json) (`2025-06-26T16:15:28.753`) +- [CVE-2025-50350](CVE-2025/CVE-2025-503xx/CVE-2025-50350.json) (`2025-06-26T16:15:30.980`) +- [CVE-2025-51671](CVE-2025/CVE-2025-516xx/CVE-2025-51671.json) (`2025-06-26T16:15:31.147`) +- [CVE-2025-52477](CVE-2025/CVE-2025-524xx/CVE-2025-52477.json) (`2025-06-26T17:15:30.897`) +- [CVE-2025-6699](CVE-2025/CVE-2025-66xx/CVE-2025-6699.json) (`2025-06-26T16:15:34.590`) +- [CVE-2025-6700](CVE-2025/CVE-2025-67xx/CVE-2025-6700.json) (`2025-06-26T16:15:35.740`) +- [CVE-2025-6701](CVE-2025/CVE-2025-67xx/CVE-2025-6701.json) (`2025-06-26T16:15:36.930`) +- [CVE-2025-6702](CVE-2025/CVE-2025-67xx/CVE-2025-6702.json) (`2025-06-26T16:15:38.033`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `37` -- [CVE-2024-51977](CVE-2024/CVE-2024-519xx/CVE-2024-51977.json) (`2025-06-26T15:15:22.167`) -- [CVE-2025-44203](CVE-2025/CVE-2025-442xx/CVE-2025-44203.json) (`2025-06-20T16:15:28.700`) -- [CVE-2025-45784](CVE-2025/CVE-2025-457xx/CVE-2025-45784.json) (`2025-06-18T15:15:26.710`) -- [CVE-2025-45890](CVE-2025/CVE-2025-458xx/CVE-2025-45890.json) (`2025-06-20T16:15:29.240`) -- [CVE-2025-46109](CVE-2025/CVE-2025-461xx/CVE-2025-46109.json) (`2025-06-18T16:15:27.607`) -- [CVE-2025-46157](CVE-2025/CVE-2025-461xx/CVE-2025-46157.json) (`2025-06-18T14:15:44.687`) -- [CVE-2025-46179](CVE-2025/CVE-2025-461xx/CVE-2025-46179.json) (`2025-06-20T15:15:20.860`) -- [CVE-2025-6173](CVE-2025/CVE-2025-61xx/CVE-2025-6173.json) (`2025-06-17T20:50:23.507`) -- [CVE-2025-6342](CVE-2025/CVE-2025-63xx/CVE-2025-6342.json) (`2025-06-20T14:15:32.260`) -- [CVE-2025-6343](CVE-2025/CVE-2025-63xx/CVE-2025-6343.json) (`2025-06-20T14:15:32.667`) -- [CVE-2025-6344](CVE-2025/CVE-2025-63xx/CVE-2025-6344.json) (`2025-06-20T14:15:32.970`) -- [CVE-2025-6345](CVE-2025/CVE-2025-63xx/CVE-2025-6345.json) (`2025-06-20T15:15:35.800`) -- [CVE-2025-6346](CVE-2025/CVE-2025-63xx/CVE-2025-6346.json) (`2025-06-20T15:15:35.983`) -- [CVE-2025-6351](CVE-2025/CVE-2025-63xx/CVE-2025-6351.json) (`2025-06-20T16:15:30.250`) -- [CVE-2025-6360](CVE-2025/CVE-2025-63xx/CVE-2025-6360.json) (`2025-06-26T15:35:49.490`) -- [CVE-2025-6361](CVE-2025/CVE-2025-63xx/CVE-2025-6361.json) (`2025-06-26T15:33:24.173`) -- [CVE-2025-6362](CVE-2025/CVE-2025-63xx/CVE-2025-6362.json) (`2025-06-26T15:30:56.573`) -- [CVE-2025-6364](CVE-2025/CVE-2025-63xx/CVE-2025-6364.json) (`2025-06-26T15:28:57.953`) -- [CVE-2025-6436](CVE-2025/CVE-2025-64xx/CVE-2025-6436.json) (`2025-06-26T14:15:32.083`) -- [CVE-2025-6531](CVE-2025/CVE-2025-65xx/CVE-2025-6531.json) (`2025-06-26T15:15:24.250`) -- [CVE-2025-6555](CVE-2025/CVE-2025-65xx/CVE-2025-6555.json) (`2025-06-26T14:15:32.340`) -- [CVE-2025-6556](CVE-2025/CVE-2025-65xx/CVE-2025-6556.json) (`2025-06-26T14:15:32.510`) -- [CVE-2025-6620](CVE-2025/CVE-2025-66xx/CVE-2025-6620.json) (`2025-06-26T14:15:32.737`) -- [CVE-2025-6621](CVE-2025/CVE-2025-66xx/CVE-2025-6621.json) (`2025-06-26T14:15:32.933`) -- [CVE-2025-6624](CVE-2025/CVE-2025-66xx/CVE-2025-6624.json) (`2025-06-26T14:15:33.070`) +- [CVE-2025-46158](CVE-2025/CVE-2025-461xx/CVE-2025-46158.json) (`2025-06-26T16:15:30.733`) +- [CVE-2025-51672](CVE-2025/CVE-2025-516xx/CVE-2025-51672.json) (`2025-06-26T16:15:31.347`) +- [CVE-2025-5209](CVE-2025/CVE-2025-52xx/CVE-2025-5209.json) (`2025-06-26T16:01:40.640`) +- [CVE-2025-6134](CVE-2025/CVE-2025-61xx/CVE-2025-6134.json) (`2025-06-26T16:46:43.547`) +- [CVE-2025-6135](CVE-2025/CVE-2025-61xx/CVE-2025-6135.json) (`2025-06-26T16:44:08.650`) +- [CVE-2025-6136](CVE-2025/CVE-2025-61xx/CVE-2025-6136.json) (`2025-06-26T16:37:17.293`) +- [CVE-2025-6137](CVE-2025/CVE-2025-61xx/CVE-2025-6137.json) (`2025-06-26T16:33:18.123`) +- [CVE-2025-6139](CVE-2025/CVE-2025-61xx/CVE-2025-6139.json) (`2025-06-26T16:27:37.157`) +- [CVE-2025-6159](CVE-2025/CVE-2025-61xx/CVE-2025-6159.json) (`2025-06-26T16:21:06.720`) +- [CVE-2025-6160](CVE-2025/CVE-2025-61xx/CVE-2025-6160.json) (`2025-06-26T16:15:47.617`) +- [CVE-2025-6161](CVE-2025/CVE-2025-61xx/CVE-2025-6161.json) (`2025-06-26T16:04:27.483`) +- [CVE-2025-6173](CVE-2025/CVE-2025-61xx/CVE-2025-6173.json) (`2025-06-26T15:57:47.900`) +- [CVE-2025-6291](CVE-2025/CVE-2025-62xx/CVE-2025-6291.json) (`2025-06-26T17:00:25.153`) +- [CVE-2025-6292](CVE-2025/CVE-2025-62xx/CVE-2025-6292.json) (`2025-06-26T17:25:51.993`) +- [CVE-2025-6293](CVE-2025/CVE-2025-62xx/CVE-2025-6293.json) (`2025-06-26T17:22:14.003`) +- [CVE-2025-6294](CVE-2025/CVE-2025-62xx/CVE-2025-6294.json) (`2025-06-26T17:21:26.107`) +- [CVE-2025-6295](CVE-2025/CVE-2025-62xx/CVE-2025-6295.json) (`2025-06-26T17:19:48.817`) +- [CVE-2025-6300](CVE-2025/CVE-2025-63xx/CVE-2025-6300.json) (`2025-06-26T17:14:20.587`) +- [CVE-2025-6301](CVE-2025/CVE-2025-63xx/CVE-2025-6301.json) (`2025-06-26T17:09:26.040`) +- [CVE-2025-6341](CVE-2025/CVE-2025-63xx/CVE-2025-6341.json) (`2025-06-26T17:31:18.840`) +- [CVE-2025-6342](CVE-2025/CVE-2025-63xx/CVE-2025-6342.json) (`2025-06-26T15:43:29.243`) +- [CVE-2025-6343](CVE-2025/CVE-2025-63xx/CVE-2025-6343.json) (`2025-06-26T15:41:01.887`) +- [CVE-2025-6344](CVE-2025/CVE-2025-63xx/CVE-2025-6344.json) (`2025-06-26T15:38:17.790`) +- [CVE-2025-6697](CVE-2025/CVE-2025-66xx/CVE-2025-6697.json) (`2025-06-26T16:15:32.560`) +- [CVE-2025-6698](CVE-2025/CVE-2025-66xx/CVE-2025-6698.json) (`2025-06-26T16:15:33.583`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7e8013a1c07..270aaab2c82 100644 --- a/_state.csv +++ b/_state.csv @@ -46920,7 +46920,7 @@ CVE-2010-5301,0,0,583f9fd1855b9ace664450510c74afa0308b2c32502d708f3d3f65ee639063 CVE-2010-5302,0,0,b62265de4c92e92a54d7af21e552ac20d2c2227e399750b58f8eff05f4537bed,2025-04-12T10:46:40.837000 CVE-2010-5303,0,0,919bf68db8b6d2c5950419ce6e7250d2013f50cfb20cc8a56a52d0fd01c71453,2025-04-12T10:46:40.837000 CVE-2010-5304,0,0,48036b1f373720fee56e102c186ef2e310b690ba81271d62a16d97190ca830d7,2024-11-21T01:22:59.840000 -CVE-2010-5305,0,0,085485fc6a88b06e190d257793ca8788456f836c5ff6f108a4a47ab93628111e,2025-04-14T22:15:15.097000 +CVE-2010-5305,0,1,499ea1bdb15df7a8d35ce20f05ad9120c34649ed8c4a690075475d3f0091e8be,2025-06-26T17:15:28.510000 CVE-2010-5306,0,0,9f3ea0a94065bb5498fad05090ddf3c76e0c9df583a4b7bc215d0969343ab9d1,2025-04-12T10:46:40.837000 CVE-2010-5307,0,0,bc576dd47d7c761bc7f31868f952c0a795c38e45f0b3ab832ee30e5beaaf3737,2025-04-12T10:46:40.837000 CVE-2010-5308,0,0,6ef7cedc49106e184c9711ac6468d3345c3d283034bdc91feba0c63406f7004c,2025-04-12T10:46:40.837000 @@ -141501,7 +141501,7 @@ CVE-2019-6531,0,0,cb8e590b8dc2b819ec3417d9fe3c30485ca87bc7b47bfac77102001703d3c0 CVE-2019-6532,0,0,a7ab7164edd4c12d3debed5586db0a7c6623e927293f801349a342480742ae8b,2024-11-21T04:46:38.490000 CVE-2019-6533,0,0,49b6e28bf6c53111484228f93153f3996088f0421e9034f39c81529e61d45eb9,2024-11-21T04:46:38.613000 CVE-2019-6534,0,0,e5204fe70dc3ff28a7a3db42b94447f761369232b14976f03ea6e86d98ae3939,2024-11-21T04:46:38.723000 -CVE-2019-6535,0,0,c389b064cf420992b4cbdb1aa85b69b98f0e3e2df5b26b75b2dc583725661d0e,2024-11-21T04:46:38.847000 +CVE-2019-6535,0,1,72c9fe16487beb7a7661e33e88c3d3e4341292d280dffb3c091d5e8eb2300d14,2025-06-26T17:15:29.873000 CVE-2019-6536,0,0,d8e992c6f2fce5b99ce1d72dcd26655f7c91fab051a2222d8b2b4f4bd0830b3e,2024-11-21T04:46:38.983000 CVE-2019-6537,0,0,6c45610650e5ad4f0b15376d8c75ca2fc178e09541e1961c96b819cd77466402,2024-11-21T04:46:39.100000 CVE-2019-6538,0,0,785d0cee55b648926c5eec7c7be1f61aba1bce6d66fce133fdb6b7975e33bf8e,2025-05-22T20:15:20.660000 @@ -237904,7 +237904,7 @@ CVE-2023-47020,0,0,77958b1e974ce3a0af29c7a34f0132e69536d415fc0c65e83c01b308bc43d CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620bb5,2025-06-17T17:15:31.567000 CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000 CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000 -CVE-2023-47029,0,0,12b49b3ede09c8051f0adf031401d06f966f450320e558466627896d3b8f70e3,2025-06-23T20:16:21.633000 +CVE-2023-47029,0,1,4a5e4f14db9e64a4730c819d67cb16af7f601e9fe9c282f515ffd92e0e6c576f,2025-06-26T16:15:24.467000 CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000 CVE-2023-47030,0,0,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000 CVE-2023-47031,0,0,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000 @@ -238139,7 +238139,7 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000 CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000 CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000 -CVE-2023-47294,0,0,d3ea47b285562c39058a8eacb339c5fa3addec63cf1a3e5b9333a2e4450da9ee,2025-06-23T20:16:21.633000 +CVE-2023-47294,0,1,298f059dd5123a102ff37a75adfdff11de59ed0a76d591fb6a7672a1acc54a2a,2025-06-26T16:15:25.483000 CVE-2023-47295,0,0,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000 CVE-2023-47297,0,0,c14fd87e4e15a5f8e3c0ca94948127ff1c65a697a69ee20c14900dd6601ff3f3,2025-06-26T12:46:49.080000 CVE-2023-47298,0,0,4c4acd197c7d9d302a966e30e51e5a36b182be0dd23706e335a822f619b88bec,2025-06-26T12:44:00.433000 @@ -240480,7 +240480,7 @@ CVE-2023-50447,0,0,3b21483f93a61c36d17c54e0e41c9704319aa4bb30ed9f5f7c0bbdda96e01 CVE-2023-50448,0,0,1356900f30989b11a427d95591f2fc88232d31d851bd0fac96eb18865bdb0f57,2024-11-21T08:37:01.203000 CVE-2023-50449,0,0,ba270c267a15999c5436411e78a8d97ec1196d3bb1ec0bc251b111bb6e5f871a,2024-11-21T08:37:01.360000 CVE-2023-5045,0,0,79d8cf6ee5e9a4b50139a237bce749eaaf7a601766908d94e71febe8668c11b0,2024-11-21T08:40:57.920000 -CVE-2023-50450,0,0,45504d3230911e141a0b81195226e9e83abec179bd39db1e436592ff9e3aa99b,2025-06-23T20:16:21.633000 +CVE-2023-50450,0,1,1b6cd36b67fe27dd05ee97a39dba06431d3a62ba2619eb6715b633c7d7630ca3,2025-06-26T16:15:25.700000 CVE-2023-50453,0,0,76d310904c175d9636c853af62d4f3f3ad8ffd78a8288d3d4c4903fddbeede50,2024-11-21T08:37:01.517000 CVE-2023-50454,0,0,bfaedf03326a6acc4075b380331bfd96efd576ce55b3819a4e641140e3d7172a,2024-11-21T08:37:01.673000 CVE-2023-50455,0,0,cf36f17a14a454b579fdc438155082da9fe3202a2d2238909649381efcfac5b3,2024-11-21T08:37:01.837000 @@ -274832,7 +274832,7 @@ CVE-2024-51962,0,0,aa5b86386886c09d6f7775b329f01551003fe6d3a5aeafe034e2c76e33a39 CVE-2024-51963,0,0,65d15561511f4792024c62d0c3dbbe1a84656f415b27a24cc7fcb099d4df16a8,2025-04-10T20:15:21.723000 CVE-2024-51966,0,0,69a0d46bcaa28466534ecd74cb2be650273566964ba1c75d7e0cb22b97d45b63,2025-04-10T20:15:21.850000 CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000 -CVE-2024-51977,0,1,ae0abc3896aa34da58408d57a73670d1ca04bb80f1162d8b9aa7bfda81885d8d,2025-06-26T15:15:22.167000 +CVE-2024-51977,0,0,ae0abc3896aa34da58408d57a73670d1ca04bb80f1162d8b9aa7bfda81885d8d,2025-06-26T15:15:22.167000 CVE-2024-51978,0,0,080238c493ca5141a0b64da3bf5cefc734cbe73438596d0d624c9190d618c4c1,2025-06-25T14:15:22.823000 CVE-2024-51979,0,0,ea92e40117ad8fa111fa4480baeb19d3876eb6d36a7c15795f6000e48a841626,2025-06-25T14:15:23.313000 CVE-2024-5198,0,0,3fa9ec394e1888d66e83812554066b455d9458d73cda1ea9275cc8bdd128d3dc,2025-06-10T16:12:09.340000 @@ -275470,6 +275470,7 @@ CVE-2024-52923,0,0,1238a4879a0bc2d925f8ecf6f96b3d1c816c52f29e36df61c25ed1ce84892 CVE-2024-52924,0,0,8b254b4a26863de18a0a4930d1f91105918cf608ca8edf047ba4e3990b61fb38,2025-03-07T20:15:37.240000 CVE-2024-52925,0,0,4d21065ff66a1748231e5c3543316979502c5f13302562a708f4fc89ea5a4eb2,2025-02-26T15:15:23.867000 CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000 +CVE-2024-52928,1,1,61501d64bda944c41887cd192eae26bb5ef6d9f05584bccd2c3019f70d252de6,2025-06-26T17:15:30.287000 CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000 CVE-2024-52935,0,0,da218bbcf32aa8ee196d0cc84ac3289085c87dcfe3a543f2e97a81e0e8e7c479,2025-01-13T19:15:10.993000 CVE-2024-52936,0,0,fc5419fb37a8a058b0ac6dbc1882fd48de1fcccd6ca5038c660a45c78f704b96,2025-01-31T17:15:15.567000 @@ -278072,7 +278073,7 @@ CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7 CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e713d0,2025-03-17T19:15:24.050000 CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000 CVE-2024-56914,0,0,064f87427a8016e13b3b895075549080817f6e33abdd6a0f7fbfa426e2cf3bd7,2025-05-21T16:11:27.750000 -CVE-2024-56915,1,1,d0a7ece1ed916208607537f968bfb4040658279997580bd41282170145899660,2025-06-26T15:15:22.570000 +CVE-2024-56915,0,1,d1dc048e1760bdf298c6c4a68351a2e047dc4225796624a31f6d3918062444d3,2025-06-26T16:15:25.910000 CVE-2024-56916,0,0,8d791153df4968d3eeeb69a9c48a710c5c1054b60793c3fffc13c78de96c4f0f,2025-06-24T20:15:24.643000 CVE-2024-56917,0,0,22eee042f4d8b258955468fa7b726ed4840860e6e36c91120f332296bae2e2f7,2025-06-24T20:15:24.790000 CVE-2024-56918,0,0,52ee2653b76f15ba0701a308965e0214f9660afd1f602bc274c062083d531183,2025-06-24T20:15:24.953000 @@ -290029,7 +290030,7 @@ CVE-2025-27581,0,0,010725d7ecbfe0dd212b958a3a5bd2c7e9f3630c39f4e0964f9540d000321 CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000 CVE-2025-27584,0,0,f03e6726bedccad19322a88f13d717b29a57c1713f548b043d4f11c0c134f427,2025-03-04T17:15:20.527000 CVE-2025-27585,0,0,720b68d2eda984711942f08d1f5d1c3e9ff08ec0907ec239e78ca92044ae9f6a,2025-03-04T17:15:20.690000 -CVE-2025-27587,0,0,960b7acde73bcafbbb57e7f733045f5ae624fbfd08a41dbeb9a4515706dcb98c,2025-06-17T20:50:23.507000 +CVE-2025-27587,0,1,c6b99f6544f7fddd6a84845f540214401821374f565d374449096dc905b663ad,2025-06-26T17:15:30.497000 CVE-2025-2759,0,0,6df40746bca0a076cfdd89fceb7edae074243de43f4b4548050e4f6a4f49b153,2025-05-23T15:55:02.040000 CVE-2025-27590,0,0,967f795bd4c85a7326c3accbc97af4e437c14d446f9275cd756d84bf07c7deb5,2025-03-10T14:01:33.053000 CVE-2025-27591,0,0,bde746d629d3275aa4bd9bd60b4521aac06adacde1e58fa17d924514d9ced6d1,2025-03-21T21:15:36.737000 @@ -290705,7 +290706,7 @@ CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccb CVE-2025-29316,0,0,edbfef5d2b6ba20f5ddacf4404f4ebf4c89ebe5fca32750f4069bf616e710afc,2025-05-05T18:15:41.723000 CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000 CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000 -CVE-2025-29331,1,1,90046cc9a3feb2cec161f106e72630fc24bc5ac7fa93d7b91d9be26c030ae076,2025-06-26T15:15:22.690000 +CVE-2025-29331,0,1,f0dcafb3ed78607ac3045ba7d382bd813392e80d643543a468e881da18e7a32b,2025-06-26T16:15:26.300000 CVE-2025-29339,0,0,3c8767e6fc1c7537f5abbed85f26508361863e04ceb6434ef3e14faf20c7a82c,2025-06-19T00:23:24.013000 CVE-2025-2935,0,0,7b37cfe809822a560bb0e6dbeb565e9e50c614feb77ac7a6501335760c490b55,2025-06-06T14:07:28.330000 CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000 @@ -291100,6 +291101,7 @@ CVE-2025-30118,0,0,63bb6fe6df661494db5327da07bd867838234c34a82e4f268cbe5bdf2fffb CVE-2025-30122,0,0,c1d95302660e92c024ec5fc6b6a580530031934f019c4b2b9b52ef0f1377e16a,2025-03-21T14:15:17.523000 CVE-2025-30123,0,0,2971729320ad92fd03f998696461ed7cc92e08495aa1f702cd91222eaa49f43d,2025-03-21T18:15:39.737000 CVE-2025-3013,0,0,2510a4bfa4128f19ce6014fbf27f574c71d4567996b6fa0082d5c4fc5dc4cae3,2025-04-01T20:26:30.593000 +CVE-2025-30131,1,1,b1d711e5bc5a7f8880f2541968e1014cbf97c89343c6d4d34427146d26bf6218,2025-06-26T17:15:30.743000 CVE-2025-30132,0,0,6dd8c4b2ac9edac69820a35ebc388d786aab74afcd8113c3b2124d47b6d5313e,2025-03-21T14:15:17.687000 CVE-2025-30137,0,0,098aef1c3a2b56ae0bd3f7cd4c3ba2daa5151c1c497ad5404ed49f32de8e9e0d,2025-03-25T17:16:24.817000 CVE-2025-30138,0,0,83aa1d57612a741bf6f8d83571e5eab154debd0cec6fc852bdac2ca81686a43b,2025-03-25T17:16:25.520000 @@ -293724,6 +293726,14 @@ CVE-2025-34039,0,0,33065581e59fb510332e7c56f1b2c71b818ba8cafc063bc369ac3087f87d0 CVE-2025-3404,0,0,3995b7b57c7d03bbf3188d8b6d9621100ea7b4d3b13f0d6dea5824ed5e0cab26,2025-04-21T14:23:45.950000 CVE-2025-34040,0,0,ab246a583bbce961c122b7ec2fd5e7d841d24372c199b5859888943ef451ba8c,2025-06-24T02:15:22.673000 CVE-2025-34041,0,0,e333513a767b39341f0e963179ee4f68eb159feea05cdd92f7bde27fcf9c7f8e,2025-06-24T02:15:22.820000 +CVE-2025-34042,1,1,d20727cc5b2bb0c6eafe3acf0e9b3010f1e115ce6353a40e1b67ca9e0345f947,2025-06-26T16:15:27.197000 +CVE-2025-34043,1,1,2d52dc77b648f719e27a78df4526fabfd1605635b55d1e414e3a580581822b47,2025-06-26T16:15:27.490000 +CVE-2025-34044,1,1,61b0d8cbede6c09108fbcf061fbd9b1e1b1033a09b76a5ddb42e6f0c6ebb1cbf,2025-06-26T16:15:27.670000 +CVE-2025-34045,1,1,bdffae3e20819f31c6479e777ee416fa283252727997eafa39503deb0035979c,2025-06-26T16:15:27.830000 +CVE-2025-34046,1,1,a89bf47e439d8bac18bdb4fc3ea0a63a7d36ebf35b34b383c0d58e384233425a,2025-06-26T16:15:27.987000 +CVE-2025-34047,1,1,61599c27ad1cedde5912fc00280e94b8abdd593a18efcdf70850d91f3531b35b,2025-06-26T16:15:28.140000 +CVE-2025-34048,1,1,a99314b47e1847b71167564fe1b15301e09472e3491da33d720fb72f3599e9b1,2025-06-26T16:15:28.273000 +CVE-2025-34049,1,1,695487e5839753bec655c0e5b29d345d03fbf9083f010851dd27893be026d554,2025-06-26T16:15:28.413000 CVE-2025-3405,0,0,a31287bf487edd9888ccf3a2cc660111ad412bcd7d306362616791fdc35de9e0,2025-04-08T18:13:53.347000 CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000 CVE-2025-3407,0,0,e5cceac7b7d945db6bab90635fdc2ec04fc23eea7f5eaa5ff6a3dce8910502a2,2025-04-08T18:13:53.347000 @@ -293920,6 +293930,7 @@ CVE-2025-36004,0,0,9607d479475c4db7f6c6570a9fe36d71d16713a1fc60b5c59ba5c3e48b0a3 CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000 CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000 CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000 +CVE-2025-36034,1,1,8ee05398fa6f54dc6754d1c9d8d0e677baeba0ca01e3ed805653c53e6b9b6357,2025-06-26T16:15:28.567000 CVE-2025-36038,0,0,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000 CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000 CVE-2025-36041,0,0,11b57158081d8cfc9ecc1117a15361007f166439f866b0246174b70d871a2d46,2025-06-16T12:32:18.840000 @@ -295601,6 +295612,7 @@ CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc CVE-2025-4413,0,0,61cf4ae74dd1877b470f2b4f5c2f8b7d6825e0d478eed1e554284b17cfa549ed,2025-06-18T13:46:52.973000 CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000 CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000 +CVE-2025-44141,1,1,ca0cd04b4ca59a878409a8ee6c555ba0b1691a170664d5f0e68e827cddde592d,2025-06-26T16:15:28.753000 CVE-2025-44148,0,0,440749a71814d76edeed70dd30fc58f3e0b75eaee931968ee8c88b7d1e24e11d,2025-06-09T18:04:33.580000 CVE-2025-4415,0,0,14ae76cc14cb7c5f3c4c963406f20e07ac9834ebdb3d6a3c4d84f73bfd11e915,2025-05-21T20:24:58.133000 CVE-2025-4416,0,0,a5c38ae8bb1fb36b46a6d4b035c3955bb8e9a586409097b52f155ce641ec588f,2025-05-21T20:24:58.133000 @@ -295621,7 +295633,7 @@ CVE-2025-44192,0,0,bbf878f3192590ae7f65b7dd525822e7ec5ccf80ca743afb76c106db31235 CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4d4d,2025-05-12T19:42:08.603000 CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000 CVE-2025-4420,0,0,482e6cb0127b5cd1381f571129f0abb13f48f8e0b486724260c2eec90487cec8,2025-06-04T14:54:33.783000 -CVE-2025-44203,0,1,986e2440b0483edc0c039355181e2e90648cd0645cc8cf4d5602b1543eba4d43,2025-06-20T16:15:28.700000 +CVE-2025-44203,0,0,986e2440b0483edc0c039355181e2e90648cd0645cc8cf4d5602b1543eba4d43,2025-06-20T16:15:28.700000 CVE-2025-44206,0,0,bcf8c43764d9f23abe08370a8241183b1c8b3a14693e972a7012ad0743e79f9c,2025-06-25T17:15:37.740000 CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000 CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000 @@ -295848,7 +295860,7 @@ CVE-2025-45513,0,0,75d2d23377bdf3eb34768546535e2634c77460ec9fb3e1dbc5e6d7c5335e2 CVE-2025-45514,0,0,a0097e631e2f67ebed1594ab343f4868011705c17a9a818d4cf23fb2040b09ab,2025-05-27T14:22:03.193000 CVE-2025-4552,0,0,78d43dd6fb452cd4c88c9ba8880aef53f1ef01b609cdfafec2c65ebbd9c2ca4a,2025-05-12T17:32:32.760000 CVE-2025-45525,0,0,d964bbfa3565b6e3c8c91f8b1ef6cff3eca96639573f7a1a53ee29de90662ea9,2025-06-20T12:15:21.780000 -CVE-2025-45526,0,0,f72eeed659a8027250b12d631897056fbfbfe8e6b44f159bff91751ee9f25441,2025-06-18T19:15:21.853000 +CVE-2025-45526,0,1,7c332e0ac82e00dd31b05e654cf89202b648251ee9903ffd3830e5fdc6c807ef,2025-06-26T16:15:29.013000 CVE-2025-45529,0,0,e167386bb5394c534585ea5a04f1a046eac90f4928a6eeb5d60ef274f5e67c1c,2025-05-28T15:01:30.720000 CVE-2025-4553,0,0,cc42244e3fcc3fa0e4735902b7107755da4e8cf945b2a43e81a0e7fb4c007005,2025-05-16T17:08:50.060000 CVE-2025-4554,0,0,689d20479ad000d274d22e94958c98af69dd587a0aebcdb180b3f5df25fbdcf6,2025-05-16T17:05:01.380000 @@ -295892,7 +295904,7 @@ CVE-2025-45755,0,0,6fe3262fee3e82261947590b30e342c111c5db410776b66947644241532cf CVE-2025-4577,0,0,599a2191d82490cb2917b4663991020a6f76d4cef5dcfc1bbad5bfcf594df4d0,2025-06-12T16:06:39.330000 CVE-2025-45779,0,0,7069f589f242601716458d7b26f08f6a87931010ba7c496f215f47c502ef806f,2025-06-13T13:40:52.883000 CVE-2025-4578,0,0,8451b1c03045c8ad3abf8c71774c6b63bc79023720225fdd15b30152793b6197,2025-06-04T20:07:45.857000 -CVE-2025-45784,0,1,d8ad263e5f9bc49f0f9e802fa5a7f8d025670a1aece36310e302714153cfafa9,2025-06-18T15:15:26.710000 +CVE-2025-45784,0,1,1183046d89fba1b8e7cc428e6740142c348eab38c81fc9b0368caaa8610e4183,2025-06-26T15:54:43.523000 CVE-2025-45786,0,0,7a0ba9ce4206224a5dbcb3a3da9e1372f377164d0fd2610cb24fccae3b269758,2025-06-23T20:16:59.783000 CVE-2025-45787,0,0,839c7946d0f8e2e3f388e984cf0b3d259f804d96030c23335dfd861ac831e334,2025-05-16T15:38:25.723000 CVE-2025-45788,0,0,d9b27095f0d050912ccc839258566df73a65f9582f737413f53a8385c0736d6f,2025-05-16T15:38:16.100000 @@ -295936,7 +295948,7 @@ CVE-2025-45880,0,0,3705fe6fc368f2fbd94d197728c7493a9d3bdf0bf25c0a8940fe6c0fa1b87 CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000 CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000 CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000 -CVE-2025-45890,0,1,3a22354013b73314b78077c7b74cb64483d104ae4e83a7c5b965ccaeb3feca9c,2025-06-20T16:15:29.240000 +CVE-2025-45890,0,0,3a22354013b73314b78077c7b74cb64483d104ae4e83a7c5b965ccaeb3feca9c,2025-06-20T16:15:29.240000 CVE-2025-4590,0,0,1338bc68ec3d6917d4ad238b5739bcbca3832b2475d3a347918656638fb549e4,2025-06-02T17:32:17.397000 CVE-2025-4591,0,0,09b633064167908f2267d3dc13a3052b782cbd19249bba4734b3313b4950008b,2025-05-16T14:43:26.160000 CVE-2025-4592,0,0,5d60bfef7beec0930ab89b7223857faa5fedaa5c280d844c7ee57c05bd2708bf,2025-06-16T12:32:18.840000 @@ -295971,16 +295983,16 @@ CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112 CVE-2025-46096,0,0,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-46101,0,0,8eb61ce0bd76c46c5a0ea5520ca1a03eea4acd2a3190f70aab698ce7c6299593,2025-06-24T16:15:28.403000 -CVE-2025-46109,0,1,0e100313151bd857873e539dccfe6f03c22b3a7f3ec7c82f464e42ce5a0237b5,2025-06-18T16:15:27.607000 +CVE-2025-46109,0,1,a81953cf13c139be94a1c266dfcc581a11077f2b3187b5b6aa057caceb5c0bbc,2025-06-26T15:51:06.490000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 CVE-2025-4613,0,0,f577ead831948daefe1272603bfaf0609f1e849af3f425f017bfac9ead135854,2025-06-12T16:06:20.180000 CVE-2025-46154,0,0,28136877062a9fbae66fc92d86286e5d62e1cd8a9e62fd05c5a06eb514bf383d,2025-06-09T18:06:28.423000 -CVE-2025-46157,0,1,e45c9755c0a2abbf93a7d97959a5d3bb221d20d255b6e42a5c09cf764b4e1fde,2025-06-18T14:15:44.687000 -CVE-2025-46158,0,0,3bb20fd037af8bfa0079f7a48d7ffdaebb00525fc8dd8a5c624354cb5d1cc754,2025-06-23T20:16:21.633000 +CVE-2025-46157,0,1,15ef5f092148ce037ce48bb6f5f34f7194730ff07b7e1a3244e0e823362d2bc8,2025-06-26T15:53:12.230000 +CVE-2025-46158,0,1,496021feb7f909223ea58ad77cd1644e57cf02b0d8b0ef3c8c84068942351766,2025-06-26T16:15:30.733000 CVE-2025-46173,0,0,4405d31e0bbca77b9a85dba04df7d6cbed12d0763cfb8e942421606ded04a3cf,2025-06-10T15:12:53.720000 CVE-2025-46176,0,0,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000 CVE-2025-46178,0,0,91c6404535de808aefa017d6b4ebfff23f380aedc9da42e3620cbfea00da5246,2025-06-12T16:06:47.857000 -CVE-2025-46179,0,1,1e9fb24c75699a26b4ed9a93c6adcfe246aa8bd706709f527d2af0a4d885ad58,2025-06-20T15:15:20.860000 +CVE-2025-46179,0,0,1e9fb24c75699a26b4ed9a93c6adcfe246aa8bd706709f527d2af0a4d885ad58,2025-06-20T15:15:20.860000 CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000 CVE-2025-46189,0,0,deb091a7b16f83dfae0adf87dba814de45a16152802aa3583ba953e5461c909b,2025-05-22T19:01:31.820000 CVE-2025-46190,0,0,49ae57538389712e46bb1f8218d4d6fdb9fc8500296b0c348e5059e767ffc2b0,2025-05-22T18:51:35.560000 @@ -297588,9 +297600,9 @@ CVE-2025-48918,0,0,96bed736df52792450e3608cc07a547f9c416534292e707cd90567bb1e330 CVE-2025-48919,0,0,b13f4700030161c8cea02111785c6dde091bc79546f3b93073b1eb28b1babf2b,2025-06-16T12:32:18.840000 CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000 CVE-2025-48920,0,0,c443e19ac648bfe69c31e79bc1998d46349e50d790bd54c32a87884332343dbc,2025-06-16T12:32:18.840000 -CVE-2025-48921,1,1,60108674aa9da19d1b7091b595c8ed40f7a1d94323589c6d910996093bab2cc9,2025-06-26T14:15:30.043000 -CVE-2025-48922,1,1,7a5047668d334930881e2b457606985ec361c1d853d924c02455f87edd193b7e,2025-06-26T14:15:30.180000 -CVE-2025-48923,1,1,1fa4ea82497ce4c558f5cb0484eb2951b14a350e9b4f9f4f35aab01f62adb054,2025-06-26T14:15:30.300000 +CVE-2025-48921,0,0,60108674aa9da19d1b7091b595c8ed40f7a1d94323589c6d910996093bab2cc9,2025-06-26T14:15:30.043000 +CVE-2025-48922,0,0,7a5047668d334930881e2b457606985ec361c1d853d924c02455f87edd193b7e,2025-06-26T14:15:30.180000 +CVE-2025-48923,0,0,1fa4ea82497ce4c558f5cb0484eb2951b14a350e9b4f9f4f35aab01f62adb054,2025-06-26T14:15:30.300000 CVE-2025-48925,0,0,21a2cb4f4a9620e34d454c14028a00f2b70dc9544a21aca3383488609c689c05,2025-05-29T14:29:50.247000 CVE-2025-48926,0,0,7c30f38d95fc987bd6e8852b968a55a7e51032b7c79b54853568428b8d32ecb1,2025-05-29T14:29:50.247000 CVE-2025-48927,0,0,709ff3b5cba6df23c4ebbabd98b2844e61f0bb8547f17efd794502cb0ceeec47,2025-05-29T14:29:50.247000 @@ -297647,7 +297659,7 @@ CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee CVE-2025-49000,0,0,f8cce1a2bdee8bde170fefa186e3e45152457ed27acc2f9d05d9f849c91c807b,2025-06-04T14:54:33.783000 CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094302,2025-06-05T14:07:47.397000 CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000 -CVE-2025-49003,1,1,6d872892fd4df39d0f411338678fc504959c64f83cc9150d4c7ae1cc0dc9727d,2025-06-26T15:15:22.963000 +CVE-2025-49003,0,0,6d872892fd4df39d0f411338678fc504959c64f83cc9150d4c7ae1cc0dc9727d,2025-06-26T15:15:22.963000 CVE-2025-49004,0,0,89d47ac006a07f0278b924493f5a5a2553c688202c5da141c2c812c60b3a1cb1,2025-06-12T16:06:47.857000 CVE-2025-49006,0,0,69cfb489d390e5afe2e42023086b2832eeed6d765863e99bd3de00a5d46a4fa7,2025-06-12T16:06:47.857000 CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000 @@ -298162,6 +298174,7 @@ CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a CVE-2025-5034,0,0,32c24ba6ccd75156344e37a326a475bfa55837c0e754ff953557111ff3de4bc2,2025-06-23T20:16:21.633000 CVE-2025-50348,0,0,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000 CVE-2025-50349,0,0,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000 +CVE-2025-50350,1,1,5cd3d30f7068da80d0dc38eff27e468cefa8ec3f83bc60e37e01ddd3f4cbf5de,2025-06-26T16:15:30.980000 CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000 CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000 CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000 @@ -298264,7 +298277,8 @@ CVE-2025-5164,0,0,228da27fe94094da78c818ea5e2c1e5953ef9870e1a7763a1facd97f4dd57f CVE-2025-5165,0,0,b944072ac0091ca469e0b415fb7abdf162d341970b7082fcfaff9d04957c85a4,2025-06-03T15:40:01.863000 CVE-2025-5166,0,0,c51ae421fabf1219a3900c58419bdaa5117f65f9603b27137cff53c0e0d61b00,2025-06-03T15:40:15.497000 CVE-2025-5167,0,0,d0507ecf0b5b21e24f107649f2515c6afbb660790e07751f18cd594dd93f34bc,2025-06-03T15:40:34.607000 -CVE-2025-51672,1,1,64d1bb8cff829221eb90bfd1173e0c4255b40a8e40cd3f00bb2e2708ccd14132,2025-06-26T15:15:23.140000 +CVE-2025-51671,1,1,3e71586572ea65b47e25c56ef10a036b0c05a5900a3ee3e329b1f54be8d8c9c1,2025-06-26T16:15:31.147000 +CVE-2025-51672,0,1,1bc0234a905d224e3d492d4ebb2a0117a74c9cce1645deaf0a5468c16d68de52,2025-06-26T16:15:31.347000 CVE-2025-5168,0,0,74f02a822faaa8b5a46a78e41282b22e771403dfc5a44608e54bea89178ff6fe,2025-06-03T15:40:48.337000 CVE-2025-5169,0,0,478bfc131e88e29d02dd1ccd61a9e6c142c0208ac4743abe27cdac119eac9f7b,2025-06-03T15:41:01.973000 CVE-2025-5170,0,0,2d3c44ad97f24506915e1ae8aa2894c6137b30f378f725193e8dabaa89f599c6,2025-06-03T15:41:52.177000 @@ -298298,7 +298312,7 @@ CVE-2025-5205,0,0,4e2cf941cdcf5c4895f1e6095123f642f58566d13011fecdf14fc65595d0e6 CVE-2025-5206,0,0,feed10da244a1180a12944193b9a34afaab380339e02b711b6b86c10a65dd729,2025-06-05T14:14:49.180000 CVE-2025-5207,0,0,e402cb7000c0d3ec5faf704526317d521bb7be7fab48c7474536b7fb38ce6981,2025-06-05T14:14:30.010000 CVE-2025-5208,0,0,9e9535cfb50c25096d995fee715ad33ab744750f67296c60cac7b3a386d28ef1,2025-06-05T14:14:06.397000 -CVE-2025-5209,0,0,8bf17c054f37888c321563ea5fff8f80a6eb5146a899768828b942498237d5fe,2025-06-17T20:50:23.507000 +CVE-2025-5209,0,1,1de988bb6fc9688228254af9049355449ffefba36f51df5a462735aed22ede34,2025-06-26T16:01:40.640000 CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fbbf,2025-06-05T14:13:54.527000 CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000 CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000 @@ -298347,6 +298361,7 @@ CVE-2025-52467,0,0,16105c9074c96ad94abfdf299814ac8afdc45b40f5844eda614417a0d3d4c CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000 CVE-2025-52471,0,0,0c62d382ed0af363c08f042f130801cb12a4f00ca1898ecf3fe6d67ae2476ac6,2025-06-24T20:15:26.033000 CVE-2025-52474,0,0,85659b730b44219986935e49453dd6cf44bae5c711fd564545190739032f0da6,2025-06-23T20:16:59.783000 +CVE-2025-52477,1,1,e07378f4d27997f6acd49a22f94ad2426dee743f2043ef8c0d7e90c5eb6640db,2025-06-26T17:15:30.897000 CVE-2025-52479,0,0,c2fb883dab9af3bda17257faea1540c97a64f864f363f43f9aac347719c31a58,2025-06-25T16:15:27.017000 CVE-2025-5248,0,0,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000 CVE-2025-52480,0,0,9058ad9c4f4d9cf4adc8bc18d88405dbdd03cfd1af621ce6c0bb86ccfe2ced26,2025-06-25T17:15:38.590000 @@ -298377,7 +298392,7 @@ CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcf CVE-2025-52570,0,0,b69e7827dc71b47cbfc70d06c560ede1e01f1eed518d271e063fa0ddf9df6ff5,2025-06-24T04:15:50.360000 CVE-2025-52571,0,0,93605af77865e4b4bbd8aa8df37b6227ed19cbe7c36e4563dfbf22f7ad6141df,2025-06-24T20:15:26.213000 CVE-2025-52572,0,0,c9098d5ca2a634c2c4a58c403cfc6222ba614b823936e2401333651171589a19,2025-06-24T21:15:25.463000 -CVE-2025-52573,1,1,45796b9039d24b9a3eda334ce45b25e7e4892eb3f5a75cc205d2727ac54b744b,2025-06-26T14:15:30.577000 +CVE-2025-52573,0,0,45796b9039d24b9a3eda334ce45b25e7e4892eb3f5a75cc205d2727ac54b744b,2025-06-26T14:15:30.577000 CVE-2025-52574,0,0,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000 CVE-2025-52576,0,0,54ca2c256007cfab31d182d53578f909d2f84aab8167fde4bfa01ad557b852cc,2025-06-25T18:15:22.537000 CVE-2025-5258,0,0,fb6007864f0f198afc07f9e5f2cd9992c3bc7deee34ac7dac8830ce62da80bc3,2025-06-24T08:15:24.397000 @@ -298441,7 +298456,7 @@ CVE-2025-52880,0,0,9cb07f316e3d88e0df580ddbed7ea9b43e79f625bd4ca243674ed28fb6c24 CVE-2025-52882,0,0,1202797e512191e9de7b995f3a96465f7bfc2ed3174a803e0c7dd48572c30229,2025-06-24T20:15:26.543000 CVE-2025-52883,0,0,94a59b16d2725ff940e9d9c5d66af8696ae28208bd1cc6d6422de88432398bcc,2025-06-24T21:15:26.030000 CVE-2025-52884,0,0,111efc59963d9cf24b8cfd776de05a966fe0af3c7a58d02e676305ff800577c2,2025-06-24T21:15:26.207000 -CVE-2025-52887,1,1,1b1934b1ff0f584f251ffd339ac8ae7cc59d8fb82a7344dfd94d51d04ab35793,2025-06-26T15:15:23.350000 +CVE-2025-52887,0,0,1b1934b1ff0f584f251ffd339ac8ae7cc59d8fb82a7344dfd94d51d04ab35793,2025-06-26T15:15:23.350000 CVE-2025-52888,0,0,3d1af33939cf7d42fdad330956d26c92022bdd0439ccab86c4344f860a5a72bc,2025-06-24T20:15:26.700000 CVE-2025-52889,0,0,9da61724b301758b81e861d135c2b4f87c1d9193c45f2d7ba9df9323c5b8a14a,2025-06-25T18:15:22.653000 CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000 @@ -298449,8 +298464,8 @@ CVE-2025-52890,0,0,21f05b9dc7685c75ed3a78bf53cc0622eed7e0158a3757e7d2757bba0471e CVE-2025-52893,0,0,fde8c69e5dfb177b45c8843696effb13dc55e52e52a7f13d69ef2cf3a5264867,2025-06-25T17:15:39.523000 CVE-2025-52894,0,0,86c1ea7749bd2ac6272c7b237f4f0745b29d5d1222611ddfdb5e5bdeb4764540,2025-06-25T17:15:39.677000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 -CVE-2025-52900,1,1,c5c483edb4b5cd5d587284cd43f3e048c5fac4dcd7c164812dc6bcc063dba44c,2025-06-26T15:15:23.520000 -CVE-2025-52902,1,1,ba0957095b9b497f96459df71ff00fe93cee82677e7b9be6aedce9789f09da30,2025-06-26T15:15:23.687000 +CVE-2025-52900,0,0,c5c483edb4b5cd5d587284cd43f3e048c5fac4dcd7c164812dc6bcc063dba44c,2025-06-26T15:15:23.520000 +CVE-2025-52902,0,0,ba0957095b9b497f96459df71ff00fe93cee82677e7b9be6aedce9789f09da30,2025-06-26T15:15:23.687000 CVE-2025-5291,0,0,30fc605f4380fb7e9cd3dc4c3c29792847dcfc90b0ea5fa3ca9a29d145a853dc,2025-06-17T20:50:23.507000 CVE-2025-52916,0,0,aaaed48e0f18bf7221f6e78c081756a27d5cc78db64cc6bd43ff354b6dcf72ac,2025-06-23T20:16:21.633000 CVE-2025-52917,0,0,2c681ba1c2eaadda0232ca155b7a07de3998b80dd04ae3c39bb2c896cba07a42,2025-06-23T20:16:21.633000 @@ -298485,8 +298500,8 @@ CVE-2025-52979,0,0,52505f03c11370107b014986dc0342ab4c8462260c5f831736e7ef7e18fd3 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000 CVE-2025-52999,0,0,8a6973aa5c242bcc72c2aa1d3ea8125d3c697581af3172eff6b5e1b688b524fb,2025-06-25T17:15:39.820000 -CVE-2025-53002,1,1,3d69344d128cf8e6eba45391a732f0f15c3f4b3fd0c2794df181a207042522e3,2025-06-26T15:15:23.873000 -CVE-2025-53007,1,1,2141606fce0283ce971232c003b310c482d4ee9ab26eb96012fd96c997a705a2,2025-06-26T15:15:24.043000 +CVE-2025-53002,0,0,3d69344d128cf8e6eba45391a732f0f15c3f4b3fd0c2794df181a207042522e3,2025-06-26T15:15:23.873000 +CVE-2025-53007,0,0,2141606fce0283ce971232c003b310c482d4ee9ab26eb96012fd96c997a705a2,2025-06-26T15:15:24.043000 CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000 CVE-2025-53021,0,0,f00c7a7e87b168adf26db9622068d05e126e48777cea689658514ba01dbc3fdf,2025-06-24T20:15:26.867000 CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000 @@ -298783,7 +298798,7 @@ CVE-2025-5676,0,0,1ca2c49bb4d510b5740938a869bb2d11a6220d1957dff2d9f9653e2673322f CVE-2025-5677,0,0,364b4a61489a27818eacb60d1e1f6c17d4c2d09e9d81b672d48b3e04da11ebb6,2025-06-10T19:31:37.290000 CVE-2025-5679,0,0,39a76065dd3011f556df8ecc5c1607529488c249cbea269aa42dbb97296654d5,2025-06-05T20:12:23.777000 CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000 -CVE-2025-5682,1,1,4d46e61991b0a8d86404415b7a96b5fc7e62533e3aaf1ba49adc7537bb8ebbe3,2025-06-26T14:15:31.280000 +CVE-2025-5682,0,0,4d46e61991b0a8d86404415b7a96b5fc7e62533e3aaf1ba49adc7537bb8ebbe3,2025-06-26T14:15:31.280000 CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000 CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000 CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000 @@ -299090,12 +299105,12 @@ CVE-2025-6130,0,0,cb569be39f5f1da076d06669e0896e22c8cd60dff8ebc57d155295bc5acb6c CVE-2025-6131,0,0,2866309ab3a411ed34af4bfc174dd80cc2f38df6ce0809f56ec34a44e1386fa4,2025-06-17T20:50:23.507000 CVE-2025-6132,0,0,4820b926dce549d59ace28c44f962f1b682b6ad27fe3050ad7fcb6e14d23357a,2025-06-17T20:50:23.507000 CVE-2025-6133,0,0,e8ce544a9effd7cb8b54da22c642c5245af611c0276c41dc8559e4d5a610718a,2025-06-24T19:44:40.803000 -CVE-2025-6134,0,0,e314e671c8bc5848fa55335e6580660a169004bde35b809cd5c9e61560c3067a,2025-06-17T20:50:23.507000 -CVE-2025-6135,0,0,ee51cf2c4222bfb9ad2c176fca2a379a43397e990b2eb061f92b5c8b5b0a323a,2025-06-17T20:50:23.507000 -CVE-2025-6136,0,0,e9caa20ba8500c81ebc641ee6a945f6f003a8d2240dcf3f113058eaffabd98de,2025-06-17T20:50:23.507000 -CVE-2025-6137,0,0,61118b7323f6830919ef7135da4ecd957265d06148eafb09448f3d4e9c68092c,2025-06-17T20:50:23.507000 +CVE-2025-6134,0,1,8a23584764f618ffd2d4995a9b4d16e5d5cdabc35d0090302e1cb1d8481cb193,2025-06-26T16:46:43.547000 +CVE-2025-6135,0,1,506099148e534a57e74eec0360b5146bb6d16f5700b5c048c16b15d25659f5e9,2025-06-26T16:44:08.650000 +CVE-2025-6136,0,1,5f7e8be2da42633353469049b7512fa5d07106f6da9174f3722e62acbd430a92,2025-06-26T16:37:17.293000 +CVE-2025-6137,0,1,ddc67afa546c83e767dcbbc7b7e064e9742a4bea6b7f9760a6f55350f1985699,2025-06-26T16:33:18.123000 CVE-2025-6138,0,0,69c19eff97e06c34f5b8cfdfba9cb33f9498a49d64177b5418e8373bd3e2dbbf,2025-06-20T14:34:32.397000 -CVE-2025-6139,0,0,a963e3b0573264a9167c8ed8cca13c432a733696dfe2f1dd43cd1680a94578bf,2025-06-17T20:50:23.507000 +CVE-2025-6139,0,1,1e573675182fd2c70c93e9d60e690c79091588fc0dffcb1bdf91b56cec3b2b4c,2025-06-26T16:27:37.157000 CVE-2025-6140,0,0,90c8d7894599b8728f992434ba3431a19d89cc26541cb2e9752a70dfc43adc3f,2025-06-17T20:50:23.507000 CVE-2025-6141,0,0,da13bc3db5b6441ec02280dd31d41a049dec0de80cbb8316bf3d83796a9c0f04,2025-06-17T20:50:23.507000 CVE-2025-6142,0,0,e80f42b3df69bc7d34694aade5534d0147faa50d387373f1d151bcbe4aa458f3,2025-06-17T20:50:23.507000 @@ -299115,9 +299130,9 @@ CVE-2025-6155,0,0,3e8fc69cbf51a07d93c7df9f9e6e4b66e36cc96b90ecd10cbf6a0ab1b9592e CVE-2025-6156,0,0,50bad226a589479fea329c4b9ea16aa953872a48df791a98c47ba27f5989fe25,2025-06-24T15:52:28.587000 CVE-2025-6157,0,0,180c03ace223f2bdc4a4810f873bfe6ccf5f7edb279d8977a5782cbd3224fa72,2025-06-24T15:52:26.320000 CVE-2025-6158,0,0,2f36d74bb802a051d651546127c3dc725b5baddaf659643b5bacdd29188892d6,2025-06-17T20:50:23.507000 -CVE-2025-6159,0,0,38e8ac5e5294c42b259b82c8daef65af0d7b30e502051f62b250d30a5a031545,2025-06-17T20:50:23.507000 -CVE-2025-6160,0,0,ade16d050fe213428b173ad29429dde198ba45d3ed2aa7e95b41154f41eeda9d,2025-06-17T20:50:23.507000 -CVE-2025-6161,0,0,eef177824c88350da4912eea2cf199bbbd914eebd1a4811f8e4dddf4e232cff7,2025-06-17T20:50:23.507000 +CVE-2025-6159,0,1,b6654ae04ca00ebe3d5ed69f1af3600e83fc73919e57aba07df0f12e772f5196,2025-06-26T16:21:06.720000 +CVE-2025-6160,0,1,5ffd3a5dc242cfd1fecdd7fd3e437c972a4776d68b464499becd18bc1698dcb4,2025-06-26T16:15:47.617000 +CVE-2025-6161,0,1,0e873c05638bc7fdac845123aea4c5a97ffb7356cc08e5c74933eb0b81f079d0,2025-06-26T16:04:27.483000 CVE-2025-6162,0,0,e84675b06fecb8413603d644d7dc1a9c194bceeff6262adb1f964a4383ba4305,2025-06-23T19:20:50.197000 CVE-2025-6163,0,0,6e13a9e163cb9e3184563f5c7b63b8596f5e63cf06bd837983ba5aafb4c041ca,2025-06-23T19:11:22.090000 CVE-2025-6164,0,0,c17ffe7ec702387ad5d177a5e91c7296a9ef4f80a11f6ea499b523afd7af1e02,2025-06-23T19:01:39.440000 @@ -299127,7 +299142,7 @@ CVE-2025-6167,0,0,e83c0c1ea86d6b605cd16c602292d01c1e3a7ce00c593e57ae080fcd8bf11e CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000 CVE-2025-6170,0,0,b78aff7a1c8e8db8ce7aabd9ccc1b29ff578e0357c573a194099cb12287faea6,2025-06-17T20:50:23.507000 CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000 -CVE-2025-6173,0,1,9d65cce56e690409faedd082c2e62db2916ca8efaa5a80d53a28792b8de1cc38,2025-06-17T20:50:23.507000 +CVE-2025-6173,0,1,c070b1517acd95c5e869ebc2e1f1712fafd19138bea48c0324a49cddfc5a27e5,2025-06-26T15:57:47.900000 CVE-2025-6177,0,0,f708d677d17f57d89176eeab0f542a182dcbda72661cc0eb13a3bc38d1575fd3,2025-06-17T20:50:23.507000 CVE-2025-6179,0,0,ef3e1c0f37267be4950d18366a27dfd0b0e58f054fc3240188e66ee490b59e39,2025-06-17T20:50:23.507000 CVE-2025-6191,0,0,f0f3b688b48f4f8183a91df95fa38ffe0dfc74cf3682559765b5451f2fa22fc1,2025-06-23T20:16:59.783000 @@ -299170,15 +299185,15 @@ CVE-2025-6286,0,0,0986e442b62971a42e733069c69f2b535595029d77fbaa4fa93e52b8d99f5a CVE-2025-6287,0,0,1f0442e805994dfa210a8eb3aa304f70a76a3d031c0d44f5ffd1b0d3dde5756c,2025-06-23T20:16:40.143000 CVE-2025-6288,0,0,9ce149ad42505ec2b4ca64cb24a668e9a7b4bbe84cfa5abc98150f3205f4a2c1,2025-06-23T20:16:40.143000 CVE-2025-6290,0,0,fd5137afaf81f121f32b5fb857c9bd0fbd66061602c501bf3307842726132473,2025-06-26T02:15:22.733000 -CVE-2025-6291,0,0,d55175acbacd88914c9be973fe6f91be8167aa92b1c93ae033cdffad235834e1,2025-06-23T20:16:40.143000 -CVE-2025-6292,0,0,ff04dbdfad10a3b13607f775be002341c1f09a7a43bda27cdc2a017c4c5d4f1d,2025-06-23T20:16:40.143000 -CVE-2025-6293,0,0,51c953c2806e51616f5a3280e43a32ce3c0eb07cbfb8381ded97a6c641ce5cdc,2025-06-23T20:16:40.143000 -CVE-2025-6294,0,0,5b3ad9b265c9fd5c11c1726b2df030f0862788c5649c89e9fd5dedb4b770da23,2025-06-23T20:16:40.143000 -CVE-2025-6295,0,0,0bd04a66f87e78692ba4dee61309ed11f9c3c7899587e401de1e30ab4b60ad63,2025-06-23T20:16:40.143000 +CVE-2025-6291,0,1,dc1a968051b9db85759355228419cc46165b7a6778eb4ff9ec8664745bc75db4,2025-06-26T17:00:25.153000 +CVE-2025-6292,0,1,950777517b48d376f4e9cfbb6475ca5763192a729885525f030e7df89973a74b,2025-06-26T17:25:51.993000 +CVE-2025-6293,0,1,30342ac281aebc0a30969c59d523a1a3a2cc7a536dbaaadfbb8317c27c072af8,2025-06-26T17:22:14.003000 +CVE-2025-6294,0,1,2f20bcf126712080bcfde5ea574f9107db7d0aaac3eeac826f2b5961068819f0,2025-06-26T17:21:26.107000 +CVE-2025-6295,0,1,c68657e703a32d8a27635af3bd0cbcf47590717c8db4b4d0b6e9b6fdea795c7c,2025-06-26T17:19:48.817000 CVE-2025-6296,0,0,3199152674d281a8b0bfa9392ec2d741dc87f4294f9f5fd910f569a20facdf65,2025-06-23T20:16:40.143000 CVE-2025-6299,0,0,0c5467d80bc58e4cc48c65f2c08fc824bcbb0be1a5cdf91f595765a0183ebb54,2025-06-23T20:16:40.143000 -CVE-2025-6300,0,0,53a28bfc1e73c0675ee7f66dbc37a4105a5dda9c8fc91d61645574e9adb9d26c,2025-06-23T20:16:40.143000 -CVE-2025-6301,0,0,0880affa9b0fdf60c148716cf68fa23897d70c14416dd813615fdf9f7c220894,2025-06-23T20:16:40.143000 +CVE-2025-6300,0,1,e2ec6cf8b98712d407f84e21f599347de059cbe66e2eb84a9fc4eb6c7fb27268,2025-06-26T17:14:20.587000 +CVE-2025-6301,0,1,1a6a37865c9ad16879d590be6f25642d0cfa9abb4a67fa3b3dc503342ed3c79d,2025-06-26T17:09:26.040000 CVE-2025-6302,0,0,e3539c9b5f9b261c59bd1f61e25234e8559a654a63f9c967a1007ae0f4a5c2be,2025-06-23T20:16:40.143000 CVE-2025-6303,0,0,001666194667549d93b9d4329658990f457777439e0228e9bd08f4416d371963,2025-06-23T20:16:40.143000 CVE-2025-6304,0,0,55c7409c08e8bc681802a6630bca19d5a26cc48af50cbcd82a055c7cc06a550e,2025-06-23T20:16:40.143000 @@ -299213,14 +299228,14 @@ CVE-2025-6336,0,0,3d3db1672f06ec0712a78cc92696ede18c9e871cf673cd2a145a9a0172e32b CVE-2025-6337,0,0,161e6a8a3656b81227fce426686a6291bb2989b8708f75a64f2ebb684f913edf,2025-06-23T20:16:40.143000 CVE-2025-6339,0,0,39a93e9b819524c01a5f6335f7f0645f0590e6d2af3e1fa5bf2ca3254fef0d62,2025-06-23T20:16:40.143000 CVE-2025-6340,0,0,bb34cef064dae7650a8fedfe9b945186839c51af4c5b089557f29d1c74de6290,2025-06-23T20:16:40.143000 -CVE-2025-6341,0,0,67770d3bee16aefa22be7a7779675d17d597f87fcf7023ade15e713960edc616,2025-06-23T20:16:40.143000 -CVE-2025-6342,0,1,5d9d9ecb9d33089ab84260bc82e847bbc6b45d0c5d5a6033667e80e558bbce7a,2025-06-20T14:15:32.260000 -CVE-2025-6343,0,1,a1b8aeec96a4bd99be027cf1f3da5d5ab1bbf468484db3d3bde3ced7ee12be8d,2025-06-20T14:15:32.667000 -CVE-2025-6344,0,1,eb4eda875caa8d1445f14b88fb0e9bf5ceab8e991408dbaf902ad01031844f8c,2025-06-20T14:15:32.970000 -CVE-2025-6345,0,1,b33f24903860f4767c24c3b23695242ccd8af4a1055fa40f0a8676c27b00f49a,2025-06-20T15:15:35.800000 -CVE-2025-6346,0,1,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b38,2025-06-20T15:15:35.983000 +CVE-2025-6341,0,1,6eb97d536857f3ed3053b28a0b496ad883570be814c5c64c307e1ec4c95a4991,2025-06-26T17:31:18.840000 +CVE-2025-6342,0,1,6934fab8f5de2e37566c0bd37708ff4b41608b68048fce7936eae8dbc964dbfb,2025-06-26T15:43:29.243000 +CVE-2025-6343,0,1,486d933b030c79ce931ba483ff730af554d03b5f6333e6a7ea67c21e98e6807a,2025-06-26T15:41:01.887000 +CVE-2025-6344,0,1,d4ebe8546071c6f599337efb2154e70f6fbd03816d527c4e2779e3b0d262295d,2025-06-26T15:38:17.790000 +CVE-2025-6345,0,0,b33f24903860f4767c24c3b23695242ccd8af4a1055fa40f0a8676c27b00f49a,2025-06-20T15:15:35.800000 +CVE-2025-6346,0,0,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b38,2025-06-20T15:15:35.983000 CVE-2025-6347,0,0,314d9452b387c10ac762b3b1128a41f845645f5c30e1ff2ca81e9f93cc334357,2025-06-23T20:16:21.633000 -CVE-2025-6351,0,1,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000 +CVE-2025-6351,0,0,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000 CVE-2025-6352,0,0,9d15046a1965b14eb3ab7c9082bc02622d7ca5d63392e4ee8604e05d4ffdeda2,2025-06-26T13:50:10.427000 CVE-2025-6353,0,0,629fe18bcfbf2dd023d18f9e595e887b68dcd365925026ba25f8edb8b1dcbbd9,2025-06-23T20:16:21.633000 CVE-2025-6354,0,0,2e29c14f11a4c0713b5bb333b8bcc3f82a6e68c07f853a1752a2daff23ce8fab,2025-06-26T13:30:17.410000 @@ -299229,11 +299244,11 @@ CVE-2025-6356,0,0,761cd0ad99957f2e0c9e007ddb509923b5d31be3535a0aa240f06ebfbe76fe CVE-2025-6357,0,0,d5588ad4e25e1b2b823de5512a21009640a1b05467799f68a81f2448bf8cd2ab,2025-06-26T13:10:38.540000 CVE-2025-6358,0,0,e3ae463d2ac1773151451d366ab85d1d8dfcdf17ef41453f2202072b1b028458,2025-06-26T13:04:08.447000 CVE-2025-6359,0,0,4c6b3a89015ba9383cd0f30179b8f5c4de98d22d2446e398ba201465b8f64821,2025-06-26T12:59:46.793000 -CVE-2025-6360,0,1,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000 -CVE-2025-6361,0,1,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000 -CVE-2025-6362,0,1,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000 +CVE-2025-6360,0,0,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000 +CVE-2025-6361,0,0,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000 +CVE-2025-6362,0,0,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000 CVE-2025-6363,0,0,2cbacbb5cc6c904843e22e84139859ddf8eb0282b6eb20c13a55fd99ccbe395c,2025-06-23T20:16:21.633000 -CVE-2025-6364,0,1,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000 +CVE-2025-6364,0,0,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000 CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000 CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000 CVE-2025-6368,0,0,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000 @@ -299285,7 +299300,7 @@ CVE-2025-6432,0,0,709154992723f331a52a5ad0200366583cc8c17511eb731f8a67ceaf01c780 CVE-2025-6433,0,0,388a9e3c4ce770334337fb5b365eb81eea0a09dd37d26b543d992df75886bad1,2025-06-25T13:15:26.977000 CVE-2025-6434,0,0,25d2270e780cca263d82591b90f92aabefeed0e60517c8b2fc08da412d22a7a5,2025-06-25T15:15:26.313000 CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000 -CVE-2025-6436,0,1,64ee87009d3f405effe05016ce18b97f871de07171703adf5abee597ea8e22e5,2025-06-26T14:15:32.083000 +CVE-2025-6436,0,0,64ee87009d3f405effe05016ce18b97f871de07171703adf5abee597ea8e22e5,2025-06-26T14:15:32.083000 CVE-2025-6442,0,0,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000 CVE-2025-6443,0,0,d16bcbf7380cf8685ab0402330d7fcb780db92921035d764bb7de8978decb036,2025-06-25T22:15:20.960000 CVE-2025-6444,0,0,001723fa0e5477753e66a94b40ca3050bd1b3c324935cd810fadea01384c5f5a,2025-06-25T18:15:24.463000 @@ -299352,7 +299367,7 @@ CVE-2025-6527,0,0,a9a66d6d6a8e0192016e66fcbc4b16654b5cc67da7f8d638e0a1029d3e911b CVE-2025-6528,0,0,2d8652c6e064cbe08fda9e1243d2cdd94889748bd307dfeccdf2fd9f8f69ecd5,2025-06-23T23:15:23.783000 CVE-2025-6529,0,0,5939d745bd3d487f857a2a174ee40a3eef3cd5f9ed4541420b1ccd8bcf150ec0,2025-06-23T23:15:23.980000 CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328ca,2025-06-23T23:15:24.177000 -CVE-2025-6531,0,1,7cbb8659e90d4ef287eaefdc968ecbc80a7b050e0fc89f77f70317cf36b2eee7,2025-06-26T15:15:24.250000 +CVE-2025-6531,0,0,7cbb8659e90d4ef287eaefdc968ecbc80a7b050e0fc89f77f70317cf36b2eee7,2025-06-26T15:15:24.250000 CVE-2025-6532,0,0,86b97cc081ce799f93178d6ecc465a0c60d5e09731b91755b70d7769569024c8,2025-06-25T15:15:26.467000 CVE-2025-6533,0,0,d492ee571eaee5df043f384c635c6ac246fddd4934afdb55035bafe65d55de49,2025-06-25T15:15:26.600000 CVE-2025-6534,0,0,4aaa4dbea2d1e21bce858b4566e1e92b835724c6fd1a3385ad07ba3ba2aacaa6,2025-06-25T13:15:27.137000 @@ -299367,8 +299382,8 @@ CVE-2025-6546,0,0,7f4fed601cdb578810dd1a5cedbed6eeb0f6925914143ccccd7f3f890dcfc6 CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000 CVE-2025-6551,0,0,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000 CVE-2025-6552,0,0,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000 -CVE-2025-6555,0,1,c8debe65f417be0e5f85471b847c080813527a23bda7bdf471c05f76c2540041,2025-06-26T14:15:32.340000 -CVE-2025-6556,0,1,8a19ef2e594f32189105a51bbaa17de7108727340812df93f9f06f6754c5fa04,2025-06-26T14:15:32.510000 +CVE-2025-6555,0,0,c8debe65f417be0e5f85471b847c080813527a23bda7bdf471c05f76c2540041,2025-06-26T14:15:32.340000 +CVE-2025-6556,0,0,8a19ef2e594f32189105a51bbaa17de7108727340812df93f9f06f6754c5fa04,2025-06-26T14:15:32.510000 CVE-2025-6557,0,0,9c8d24f715ee56ef9d342378028aa791ae3be74b300c390b225046716ecd370d,2025-06-24T21:15:26.697000 CVE-2025-6559,0,0,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000 CVE-2025-6560,0,0,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000 @@ -299403,9 +299418,9 @@ CVE-2025-6616,0,0,69e3d0b87c0a15bcc888ba109078758162c727a166b9e07eb51047379945f9 CVE-2025-6617,0,0,69a437ef6870d59f3c2ba3c010071a735995948d72c1f0a5d65bea12dcb87390,2025-06-25T17:15:40.507000 CVE-2025-6618,0,0,8f0f71c280554a7c818df3f61621fbe8f744cc190f41ed0b491a2c752a76b10a,2025-06-25T18:15:24.757000 CVE-2025-6619,0,0,5c8159eab9352f8a3543f33ff16bfd3dc7f586f658a3ae25f3220f2ef1217cdb,2025-06-25T18:15:24.950000 -CVE-2025-6620,0,1,7bc5ee9a6c35175ea4c2d789f1d97faf66ba959a6ed15da7fcebe667d5d906ec,2025-06-26T14:15:32.737000 -CVE-2025-6621,0,1,92ee36f9955ed67d57c6c13f2d4643afe1425501effe00183fb5a52fccd6ca0b,2025-06-26T14:15:32.933000 -CVE-2025-6624,0,1,07a93b2e9ed3c8caae6323425b398f9c4fc0ffd70646adb166b429f500d00218,2025-06-26T14:15:33.070000 +CVE-2025-6620,0,0,7bc5ee9a6c35175ea4c2d789f1d97faf66ba959a6ed15da7fcebe667d5d906ec,2025-06-26T14:15:32.737000 +CVE-2025-6621,0,0,92ee36f9955ed67d57c6c13f2d4643afe1425501effe00183fb5a52fccd6ca0b,2025-06-26T14:15:32.933000 +CVE-2025-6624,0,0,07a93b2e9ed3c8caae6323425b398f9c4fc0ffd70646adb166b429f500d00218,2025-06-26T14:15:33.070000 CVE-2025-6627,0,0,eea8842b3eb9b3e1cf7456e6d24ea2786dc05d22ee014f3051caf23b6445a606,2025-06-25T19:15:24.260000 CVE-2025-6640,0,0,d30e371b0ff3d000e15d9a7d1b5a3f5520079493ac68bf58604fe76ee6d72653,2025-06-25T22:15:21.107000 CVE-2025-6641,0,0,e8ff4a93ccd27943e33ffe831881654d963aa2f5a55e6036214c79a67b984675,2025-06-25T22:15:21.237000 @@ -299435,19 +299450,23 @@ CVE-2025-6665,0,0,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf6 CVE-2025-6667,0,0,8d9ad53a3335c05cc0865d1435899d49a25a3ca653a61e0fdb6ad611b59d429a,2025-06-25T22:15:24.280000 CVE-2025-6668,0,0,b7f7ce19d9ba8dfe1a594307d757f6e849bb60917444403b692842e09544abd4,2025-06-25T22:15:24.450000 CVE-2025-6669,0,0,259554a4afe15a633cf6db3e0b294386f75a87b93f6e7e142528c6c7d99925a1,2025-06-25T23:15:21.310000 -CVE-2025-6674,1,1,330dc93de5a800b119559ce432f3e727a55b7663e61bb6a3f51e753d26da542e,2025-06-26T14:15:34.047000 -CVE-2025-6675,1,1,d0299463a864b2634b63a6b6631e1d2676a687384aa6c5c64b95b21049704091,2025-06-26T14:15:34.177000 -CVE-2025-6676,1,1,904b961e1617fc5b434f2a983c54e82fb2b97c2a706594be0f12c0b7f95a3275,2025-06-26T14:15:34.353000 -CVE-2025-6677,1,1,d64d334c8e0095958043e9bdfe68545d6daf525f06d22d3f20470fe56e37e7db,2025-06-26T14:15:34.540000 +CVE-2025-6674,0,0,330dc93de5a800b119559ce432f3e727a55b7663e61bb6a3f51e753d26da542e,2025-06-26T14:15:34.047000 +CVE-2025-6675,0,0,d0299463a864b2634b63a6b6631e1d2676a687384aa6c5c64b95b21049704091,2025-06-26T14:15:34.177000 +CVE-2025-6676,0,0,904b961e1617fc5b434f2a983c54e82fb2b97c2a706594be0f12c0b7f95a3275,2025-06-26T14:15:34.353000 +CVE-2025-6677,0,0,d64d334c8e0095958043e9bdfe68545d6daf525f06d22d3f20470fe56e37e7db,2025-06-26T14:15:34.540000 CVE-2025-6678,0,0,3d8df884ccaa68204bde970fbc5a3e37b905ea9e2d3ab8e9d4e745c1411dc54e,2025-06-25T18:15:25.507000 CVE-2025-6693,0,0,aed7eff55f11f001475fd2a272338716cf45f574b1a0b5d56772bf159d041cf8,2025-06-26T13:15:29.593000 -CVE-2025-6694,1,1,ee51f17d9ad75bdeb5c5974329bba1fdde90571ade9e0013b45f8ad9f704c57b,2025-06-26T14:15:34.777000 -CVE-2025-6695,1,1,e535137c3817be7c059c48f3c72b85d7d3d98b1b11478f02b3f20aa6ba18bbdf,2025-06-26T14:15:34.967000 -CVE-2025-6696,1,1,afc23a687905a86e72dc36166a80d4d75f1137dcb3f841be0fbe42b41be72f13,2025-06-26T15:15:24.633000 -CVE-2025-6697,1,1,c96659e6099a684ba934d473319311782f9c97ce54ba9ef3bbd88cabdb085dea,2025-06-26T15:15:24.840000 -CVE-2025-6698,1,1,30941f8dd3b4210c629a7239c4a179665f5aa7c14bb1dd25d45db98f6c1e9093,2025-06-26T15:15:25.023000 +CVE-2025-6694,0,0,ee51f17d9ad75bdeb5c5974329bba1fdde90571ade9e0013b45f8ad9f704c57b,2025-06-26T14:15:34.777000 +CVE-2025-6695,0,0,e535137c3817be7c059c48f3c72b85d7d3d98b1b11478f02b3f20aa6ba18bbdf,2025-06-26T14:15:34.967000 +CVE-2025-6696,0,0,afc23a687905a86e72dc36166a80d4d75f1137dcb3f841be0fbe42b41be72f13,2025-06-26T15:15:24.633000 +CVE-2025-6697,0,1,85c38d785f5e8c32346e3c53b60a2f8abf1eced95890c1012623934462d0a59f,2025-06-26T16:15:32.560000 +CVE-2025-6698,0,1,bda5d1b33c6591d4482a182f4472541cfea1ab5eec2230108598768e0855b9c7,2025-06-26T16:15:33.583000 +CVE-2025-6699,1,1,ddd4793ac17c57a98ce3f46146e63ab05b772593f92021d9b85a82f069096cae,2025-06-26T16:15:34.590000 +CVE-2025-6700,1,1,d6dd6081fc4a3e628511320526388de82806fe3f1879558f59d2b6fa0bfaac74,2025-06-26T16:15:35.740000 +CVE-2025-6701,1,1,a3e0912d16ddbd7ead3dd8db87c5dd3a2a97ee56b844df89f0e0b9adfd5dd6e0,2025-06-26T16:15:36.930000 +CVE-2025-6702,1,1,3142fcdee56d459a72b1ae0d133a9a195a16dcf0120e56e151b74ceb6f8b3871,2025-06-26T16:15:38.033000 CVE-2025-6703,0,0,09072c2cd4e411c0d5c8360ca7f6fdefccb20fabc17c8c1696e0829eab242c2a,2025-06-26T10:15:25.950000 -CVE-2025-6706,1,1,f62ce3759b16005649e600aaa9f5f382173758ca404574900daf66e4ff538bac,2025-06-26T14:15:35.157000 -CVE-2025-6707,1,1,ec1919161028fcb80da5ac4bad2fe42ce7a27924784bf7ae929f38032df9e6d2,2025-06-26T14:15:35.313000 -CVE-2025-6709,1,1,7544591fa0466921cddd7453ee0b219f2c7a2f572e56858afaa90ca58a141123,2025-06-26T14:15:35.463000 -CVE-2025-6710,1,1,1c08e8c79115ef953504d39d589598b5f33f4db72e950ece70cb5bd1de02f4b0,2025-06-26T14:15:35.613000 +CVE-2025-6706,0,0,f62ce3759b16005649e600aaa9f5f382173758ca404574900daf66e4ff538bac,2025-06-26T14:15:35.157000 +CVE-2025-6707,0,0,ec1919161028fcb80da5ac4bad2fe42ce7a27924784bf7ae929f38032df9e6d2,2025-06-26T14:15:35.313000 +CVE-2025-6709,0,0,7544591fa0466921cddd7453ee0b219f2c7a2f572e56858afaa90ca58a141123,2025-06-26T14:15:35.463000 +CVE-2025-6710,0,0,1c08e8c79115ef953504d39d589598b5f33f4db72e950ece70cb5bd1de02f4b0,2025-06-26T14:15:35.613000