Auto-Update: 2025-06-20T14:00:20.194421+00:00

This commit is contained in:
cad-safe-bot 2025-06-20 14:04:10 +00:00
parent 219c1f0274
commit 2f1a55892f
22 changed files with 1421 additions and 151 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57186",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T17:19:40.367",
"lastModified": "2025-06-17T20:15:30.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T13:08:54.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.2",
"matchCriteriaId": "7CCC57C7-61C6-4712-A8C9-110C80A31F4F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/erxes/erxes/commit/d626070a0fcd435ae29e689aca051ccfb440c2f3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57189",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T17:20:09.367",
"lastModified": "2025-06-17T20:15:31.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T13:08:09.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.2",
"matchCriteriaId": "7CCC57C7-61C6-4712-A8C9-110C80A31F4F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/erxes/erxes/commit/d626070a0fcd435ae29e689aca051ccfb440c2f3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57190",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T17:20:38.540",
"lastModified": "2025-06-12T16:06:39.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T13:07:32.170",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.1",
"matchCriteriaId": "416456BB-CF9E-472E-AFD4-5C59D3DEED94"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/erxes/erxes/commit/4ed2ca797241d2ba0c9083feeadd9755c1310ce8",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://www.sonarsource.com/blog/micro-services-major-headaches-detecting-vulnerabilities-in-erxes-microservices/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26468",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-06-09T23:15:21.753",
"lastModified": "2025-06-12T16:06:39.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T13:11:44.223",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -105,10 +105,44 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cyberdata:011209_sip_emergency_intercom:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.0.1",
"matchCriteriaId": "9FF8E66C-7C7B-4FA2-A6F6-1CC777AA6E76"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cyberdata:011209_sip_emergency_intercom:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44364BDF-A50E-425D-BBEB-B24A23B0843A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29646",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-18T18:15:24.447",
"lastModified": "2025-06-18T18:15:24.447",
"lastModified": "2025-06-20T13:15:19.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in upf in open5gs 2.7.2 and earlier allows a remote attacker to cause a Denial of Service via a crafted PFCP SessionEstablishmentRequest packet with restoration indication = true and (teid = 0 or teid >= ogs_pfcp_pdr_teid_pool.size)."
},
{
"lang": "es",
"value": "Un problema en upf en open5gs 2.7.2 y versiones anteriores permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de un paquete PFCP SessionEstablishmentRequest manipulado con indicaci\u00f3n de restauraci\u00f3n = verdadero y (teid = 0 o teid >= ogs_pfcp_pdr_teid_pool.size)."
}
],
"metrics": {
@ -49,7 +53,7 @@
],
"references": [
{
"url": "https://gist.github.com/scemodicecosa/581fa485f957239ea5551daa173d0189",
"url": "https://gist.github.com/scmdcs/581fa485f957239ea5551daa173d0189",
"source": "cve@mitre.org"
},
{

View File

@ -2,63 +2,15 @@
"id": "CVE-2025-2901",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-28T14:15:22.020",
"lastModified": "2025-03-28T18:11:40.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T12:15:21.010",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities."
},
{
"lang": "es",
"value": "Se detect\u00f3 una falla en la consola de administraci\u00f3n de JBoss EAP. Esta vulnerabilidad de Cross-site scripting almacenado ocurre cuando una aplicaci\u00f3n depura incorrectamente la entrada del usuario antes de almacenarla en un almac\u00e9n de datos. Cuando estos datos almacenados se incluyen posteriormente en p\u00e1ginas web sin la depuraci\u00f3n adecuada, se pueden ejecutar scripts maliciosos en el contexto de los usuarios que visitan estas p\u00e1ginas, lo que puede provocar robo de datos, secuestro de sesi\u00f3n u otras actividades maliciosas."
"value": "Rejected reason: This vulnerability is redundant to CVE-2025-23366 and CVE-2024-10234."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-2901",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355685",
"source": "secalert@redhat.com"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-38083",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-06-20T12:15:21.470",
"lastModified": "2025-06-20T12:15:21.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: prio: fix a race in prio_tune()\n\nGerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer\nfires at the wrong time.\n\nThe race is as follows:\n\nCPU 0 CPU 1\n[1]: lock root\n[2]: qdisc_tree_flush_backlog()\n[3]: unlock root\n |\n | [5]: lock root\n | [6]: rehash\n | [7]: qdisc_tree_reduce_backlog()\n |\n[4]: qdisc_put()\n\nThis can be abused to underflow a parent's qlen.\n\nCalling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()\nshould fix the race, because all packets will be purged from the qdisc\nbefore releasing the lock."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/46c15c9d0f65c9ba857d63f53264f4b17e8a715f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/93f9eeb678d4c9c1abf720b3615fa8299a490845",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d35acc1be3480505b5931f17e4ea9b7617fea4d3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e3f6745006dc9423d2b065b90f191cfa11b1b584",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-4102",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-20T12:15:22.140",
"lastModified": "2025-06-20T12:15:22.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Beaver Builder Plugin (Starter Version) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_enabled_icons' function in all versions up to, and including, 2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability was partially patched in version 2.9.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2eb4608f-fa4f-444c-a857-c9059777a70b?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://www.wpbeaverbuilder.com/change-logs/?utm_medium=bb-lite&utm_source=repo-readme&utm_campaign=repo-changelog-page",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-44952",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-18T16:15:27.520",
"lastModified": "2025-06-18T19:15:21.670",
"lastModified": "2025-06-20T13:15:19.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A missing length check in `ogs_pfcp_subnet_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dnn` field with a value with length greater than 101."
},
{
"lang": "es",
"value": "Una verificaci\u00f3n de longitud faltante en la funci\u00f3n `ogs_pfcp_subnet_add` de la librer\u00eda PFCP, utilizada tanto por smf como por upf en open5gs 2.7.2 y anteriores, permite a un atacante local causar un desbordamiento de b\u00fafer al cambiar el campo `session.dnn` con un valor con una longitud mayor a 101."
}
],
"metrics": {
@ -52,6 +56,10 @@
"url": "https://gist.github.com/scemodicecosa/8643fbfc9490f40e955e9f9e9b0d9077",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/scmdcs/8643fbfc9490f40e955e9f9e9b0d9077",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/open5gs/open5gs/issues/3775",
"source": "cve@mitre.org"

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-45525",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-17T20:15:32.150",
"lastModified": "2025-06-18T14:15:44.247",
"lastModified": "2025-06-20T12:15:21.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A null pointer dereference vulnerability was discovered in microlight.js (version 0.0.7), a lightweight syntax highlighting library. When processing elements with non-standard CSS color values, the library fails to validate the result of a regular expression match before accessing its properties, leading to an uncaught TypeError and potential application crash."
"value": "A NULL pointer dereference vulnerability has been identified in the JavaScript library microlight version 0.0.7, a lightweight syntax highlighting library. When processing elements with non-standard CSS color values, the library fails to validate the result of a regular expression match before accessing its properties, leading to an uncaught TypeError and potential application crash. NOTE: this is disputed by multiple parties because there is no common scenario in which an adversary can insert those non-standard values."
},
{
"lang": "es",
@ -17,6 +24,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 2.9,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.4,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +67,16 @@
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -55,6 +92,10 @@
{
"url": "https://gist.github.com/Rootingg/843368931f70886bed3cf982f10a4424",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/github/advisory-database/pull/5730",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-48448",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-06-11T15:15:42.733",
"lastModified": "2025-06-12T16:06:20.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T13:06:18.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:admin_audit_trail_project:admin_audit_trail:*:*:*:*:*:drupal:*:*",
"versionEndExcluding": "1.0.5",
"matchCriteriaId": "B335AE52-77A5-4AEB-844A-8F3C8FEC2552"
}
]
}
]
}
],
"references": [
{
"url": "https://www.drupal.org/sa-contrib-2025-068",
"source": "mlhess@drupal.org"
"source": "mlhess@drupal.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-49141",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T21:15:47.360",
"lastModified": "2025-06-12T16:06:47.857",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T13:43:48.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,18 +71,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haxtheweb:haxcms-nodejs:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "11.0.3",
"matchCriteriaId": "599C99DD-2E74-45C2-B869-31A524911531"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.0.0",
"matchCriteriaId": "1A305A52-060B-44E0-A216-AB1ABA968828"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/haxtheweb/haxcms-nodejs/commit/5131fea6b6be611db76a618f89bd2e164752e9b3",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory",
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory",
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5934",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T04:15:55.327",
"lastModified": "2025-06-12T16:06:39.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T13:11:11.560",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -129,40 +129,111 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0.88",
"matchCriteriaId": "5FA85286-E5E6-493D-BDEC-E919593D0458"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDAA5899-B73C-4690-853E-B5400F034BE1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex3700-netgear",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex3700-netgear#poc",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311712",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311712",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.588258",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.netgear.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex3700-netgear",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex3700-netgear#poc",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6005",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-12T02:15:27.003",
"lastModified": "2025-06-12T16:06:20.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T12:48:20.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/adminnerr/cve/issues/6",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.312328",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312328",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.587540",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/adminnerr/cve/issues/6",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-12T02:15:27.257",
"lastModified": "2025-06-12T16:06:20.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-20T12:46:43.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,40 +142,99 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/adminnerr/cve/issues/10",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/adminnerr/cve/issues/7",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.312329",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312329",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.587551",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.588090",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/adminnerr/cve/issues/10",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/adminnerr/cve/issues/7",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-6336",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T12:15:22.307",
"lastModified": "2025-06-20T12:15:22.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. It has been classified as critical. Affected is an unknown function of the file /boafrm/formTmultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/awindog/cve/blob/main/688/12.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/awindog/cve/blob/main/688/12.md#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313332",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313332",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596690",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-6337",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T12:15:22.517",
"lastModified": "2025-06-20T12:15:22.517",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615/4.0.0-B20230531.1404. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formTmultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/awindog/cve/blob/main/688/13.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/awindog/cve/blob/main/688/14.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313333",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313333",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596691",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596692",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6339",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T12:15:22.710",
"lastModified": "2025-06-20T12:15:22.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ponaravindb Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /func3.php. The manipulation of the argument username1 leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/freshgaming/CVEPOC/blob/main/sql-cve-new.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313334",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313334",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596744",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6340",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T13:15:19.790",
"lastModified": "2025-06-20T13:15:19.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in code-projects School Fees Payment System 1.0. This affects an unknown part of the file /branch.php. The manipulation of the argument Branch/Address/Detail leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/tuooo/CVE/issues/14",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313335",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313335",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596998",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6341",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T13:15:19.980",
"lastModified": "2025-06-20T13:15:19.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in code-projects School Fees Payment System 1.0. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/tuooo/CVE/issues/15",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313336",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313336",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.597023",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-20T12:00:21.541266+00:00
2025-06-20T14:00:20.194421+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-20T11:16:37.750000+00:00
2025-06-20T13:43:48.103000+00:00
```
### Last Data Feed Release
@ -33,31 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
298786
298793
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `7`
- [CVE-2025-4981](CVE-2025/CVE-2025-49xx/CVE-2025-4981.json) (`2025-06-20T11:15:20.993`)
- [CVE-2025-5255](CVE-2025/CVE-2025-52xx/CVE-2025-5255.json) (`2025-06-20T10:15:21.653`)
- [CVE-2025-5963](CVE-2025/CVE-2025-59xx/CVE-2025-5963.json) (`2025-06-20T10:15:22.450`)
- [CVE-2025-6328](CVE-2025/CVE-2025-63xx/CVE-2025-6328.json) (`2025-06-20T10:15:22.593`)
- [CVE-2025-6329](CVE-2025/CVE-2025-63xx/CVE-2025-6329.json) (`2025-06-20T10:15:22.820`)
- [CVE-2025-6330](CVE-2025/CVE-2025-63xx/CVE-2025-6330.json) (`2025-06-20T10:15:23.030`)
- [CVE-2025-6331](CVE-2025/CVE-2025-63xx/CVE-2025-6331.json) (`2025-06-20T10:15:23.210`)
- [CVE-2025-6332](CVE-2025/CVE-2025-63xx/CVE-2025-6332.json) (`2025-06-20T11:15:21.693`)
- [CVE-2025-6333](CVE-2025/CVE-2025-63xx/CVE-2025-6333.json) (`2025-06-20T11:15:21.897`)
- [CVE-2025-6334](CVE-2025/CVE-2025-63xx/CVE-2025-6334.json) (`2025-06-20T11:15:22.083`)
- [CVE-2025-6335](CVE-2025/CVE-2025-63xx/CVE-2025-6335.json) (`2025-06-20T11:15:22.277`)
- [CVE-2025-38083](CVE-2025/CVE-2025-380xx/CVE-2025-38083.json) (`2025-06-20T12:15:21.470`)
- [CVE-2025-4102](CVE-2025/CVE-2025-41xx/CVE-2025-4102.json) (`2025-06-20T12:15:22.140`)
- [CVE-2025-6336](CVE-2025/CVE-2025-63xx/CVE-2025-6336.json) (`2025-06-20T12:15:22.307`)
- [CVE-2025-6337](CVE-2025/CVE-2025-63xx/CVE-2025-6337.json) (`2025-06-20T12:15:22.517`)
- [CVE-2025-6339](CVE-2025/CVE-2025-63xx/CVE-2025-6339.json) (`2025-06-20T12:15:22.710`)
- [CVE-2025-6340](CVE-2025/CVE-2025-63xx/CVE-2025-6340.json) (`2025-06-20T13:15:19.790`)
- [CVE-2025-6341](CVE-2025/CVE-2025-63xx/CVE-2025-6341.json) (`2025-06-20T13:15:19.980`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `13`
- [CVE-2025-45880](CVE-2025/CVE-2025-458xx/CVE-2025-45880.json) (`2025-06-20T11:16:37.750`)
- [CVE-2024-57186](CVE-2024/CVE-2024-571xx/CVE-2024-57186.json) (`2025-06-20T13:08:54.443`)
- [CVE-2024-57189](CVE-2024/CVE-2024-571xx/CVE-2024-57189.json) (`2025-06-20T13:08:09.060`)
- [CVE-2024-57190](CVE-2024/CVE-2024-571xx/CVE-2024-57190.json) (`2025-06-20T13:07:32.170`)
- [CVE-2025-26468](CVE-2025/CVE-2025-264xx/CVE-2025-26468.json) (`2025-06-20T13:11:44.223`)
- [CVE-2025-2901](CVE-2025/CVE-2025-29xx/CVE-2025-2901.json) (`2025-06-20T12:15:21.010`)
- [CVE-2025-29646](CVE-2025/CVE-2025-296xx/CVE-2025-29646.json) (`2025-06-20T13:15:19.197`)
- [CVE-2025-44952](CVE-2025/CVE-2025-449xx/CVE-2025-44952.json) (`2025-06-20T13:15:19.377`)
- [CVE-2025-45525](CVE-2025/CVE-2025-455xx/CVE-2025-45525.json) (`2025-06-20T12:15:21.780`)
- [CVE-2025-48448](CVE-2025/CVE-2025-484xx/CVE-2025-48448.json) (`2025-06-20T13:06:18.167`)
- [CVE-2025-49141](CVE-2025/CVE-2025-491xx/CVE-2025-49141.json) (`2025-06-20T13:43:48.103`)
- [CVE-2025-5934](CVE-2025/CVE-2025-59xx/CVE-2025-5934.json) (`2025-06-20T13:11:11.560`)
- [CVE-2025-6005](CVE-2025/CVE-2025-60xx/CVE-2025-6005.json) (`2025-06-20T12:48:20.400`)
- [CVE-2025-6006](CVE-2025/CVE-2025-60xx/CVE-2025-6006.json) (`2025-06-20T12:46:43.687`)
## Download and Usage

View File

@ -278176,10 +278176,10 @@ CVE-2024-57177,0,0,06dae5d3ddad2a6c66f8afbd40a9c732b2a499e75a1412c2d2989dabc4f21
CVE-2024-57178,0,0,1f6e448ac583dbc5dc66b3e862fb64a834e1fd6ac65d6692ba488ccfc0af0396,2025-02-10T20:15:42.013000
CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000
CVE-2024-57184,0,0,3fd914158434721c2565c1759ef928a3f64e92f246b28f05ed1e4a71635f067b,2025-01-24T15:15:10.523000
CVE-2024-57186,0,0,8ea91a185dea9ef8ad68c3bf82640730108513d99d281ed1733f702bd06b1beb,2025-06-17T20:15:30.960000
CVE-2024-57189,0,0,764030fd2fa6e497fae38772c3fddf9d0f4358ec992cb2430d7d320696812220,2025-06-17T20:15:31.103000
CVE-2024-57186,0,1,a4fea2c8b548f44104aa8433b1e86f86725652e7169fdbefb3b89b5054c1b7d7,2025-06-20T13:08:54.443000
CVE-2024-57189,0,1,5cc7b01a02490c7e0d836b6e78d98173efd58f4319d143e56ed6f78594f8b9cd,2025-06-20T13:08:09.060000
CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000
CVE-2024-57190,0,0,364d82ee4f379b0c88bdd10cad5fbe47099438e4aaada5f3841af1824844bfac,2025-06-12T16:06:39.330000
CVE-2024-57190,0,1,c53d2554cfcf4efbd2893cc28f9ada3abfebecd6a01e70758c6abb36c057d7d7,2025-06-20T13:07:32.170000
CVE-2024-5720,0,0,eb323a155cad85d456bd7c0f7894b5f9589ce98c04e2db5736a7c40744f539a9,2024-11-22T20:15:10.563000
CVE-2024-5721,0,0,f143dbbb695fa9f83fd9d3c9d9d3aaa920ced069d4617f7e2c69a39cb694b5ad,2024-11-22T20:15:10.677000
CVE-2024-57211,0,0,98fcb4c7f26e4032b5a1184446b4d799208b39be2e033c671a8c4b297e19eeb9,2025-04-03T15:48:09.543000
@ -289075,7 +289075,7 @@ CVE-2025-2645,0,0,bb51f6ba23884b7e7c3767dcbb7ecf7badccba1b056823008f0ccc4a1f7f8f
CVE-2025-2646,0,0,1f43af586340e9a3b657344aff21032473ef2c407815ff224af302b07a3268d0,2025-04-02T12:32:58.283000
CVE-2025-26465,0,0,ac0fdb720eaae016b7a47bcdeea42f0bc1abfe57712ef9fedbef53f01af96ede,2025-06-02T15:15:33.437000
CVE-2025-26466,0,0,1656a292c9a746d1d9c8576626629bb24a094bd9c889c8b628a2189f999ed909,2025-05-27T16:15:31.100000
CVE-2025-26468,0,0,17482c41ff09451a3535a7fe14a7ac91b93a4d8ddac7da97b3b72d2cd03a9ad2,2025-06-12T16:06:39.330000
CVE-2025-26468,0,1,4fd01615a1742c4cfaeb880be6c89f6eae81ae99823dbde52c98885c0abac474,2025-06-20T13:11:44.223000
CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000
CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000
CVE-2025-26475,0,0,bb522c072ef93dfba48b372ed229d0225844c8b3a620822d85a725743264d063,2025-05-20T18:01:18.020000
@ -290540,7 +290540,7 @@ CVE-2025-29003,0,0,ac4e6c10cc78a574f687bbb129b00b12f05050f35ac2c9c26548828339796
CVE-2025-29005,0,0,c9f8dbfedc641b5548bf37c246299e6accbd08e55b091ed72183877cf47bcc48,2025-06-06T14:06:58.193000
CVE-2025-29006,0,0,4d1d38cd7a0c468226e8aca886cb106ca62c5b00f9e00f7f812545f9eaf5dd09,2025-06-06T14:06:58.193000
CVE-2025-29008,0,0,3b3ab06273da56c69a0fb2483c56df3fa9f5064413b83eea18a740c113bcd8c7,2025-06-06T14:06:58.193000
CVE-2025-2901,0,0,7945b2fda0703ed54bbe3617c5290b84173e50497fd12854a07978736660a0d3,2025-03-28T18:11:40.180000
CVE-2025-2901,0,1,692b7d4a80d8571564de4afe3e8a8fdc6532e8e3f67037d3bd7472bf570ebf4c,2025-06-20T12:15:21.010000
CVE-2025-29010,0,0,2e9f5293886bf5addf72b3ca5c7cabe4b8562b76040594b809db668966e61926,2025-06-06T14:06:58.193000
CVE-2025-29011,0,0,aba5b1495d441572d1adfbb50603eeeadd62a30cda9cc6bdfe85d38ffce67aa1,2025-06-06T14:06:58.193000
CVE-2025-29013,0,0,8f57011cf53e8e7ea010a2914057553d82b531c5316817362a5957e50cd4e927,2025-06-06T14:06:58.193000
@ -290746,7 +290746,7 @@ CVE-2025-29635,0,0,ec72c4a9bc58304e70384a4323071097e434b0be9c6a730e4fb246fc5922f
CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b74,2025-04-04T01:15:39.640000
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
CVE-2025-29646,0,0,27768f20743b72a41ac9de47e47397eea7c433746d830ce1bd5ebf98cb45620e,2025-06-18T18:15:24.447000
CVE-2025-29646,0,1,aac887cbb3095bcdb25ae2cc993037674f9d4e0050f0990d7c84192477642d22,2025-06-20T13:15:19.197000
CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000
CVE-2025-29648,0,0,84bec7b21f7c56a1385297c289052d8ecde84cec92268af480ddf8554a7270a0,2025-06-16T22:15:44.517000
CVE-2025-29649,0,0,674d024497e2e807662619a838994b70647b9018a5b3a3e54a8fa02abea03a23,2025-06-16T22:15:55.553000
@ -294354,6 +294354,7 @@ CVE-2025-3808,0,0,c9d9b38c3b98d0e004f3d362b1c7affeec1437a2f1dff864304e4ff67e8ee1
CVE-2025-38080,0,0,e00e96fa173f4982c0f68473198cf4b255f45cca4e7210641334f9df42962a1a,2025-06-18T13:46:52.973000
CVE-2025-38081,0,0,510cb4d9f47dcfb17b58f7c2e83ccf68290c19ee4b91dac241315d78f17312cd,2025-06-18T13:46:52.973000
CVE-2025-38082,0,0,aaafb161848f298937b6a47f65e2883d0867c50015d2e09e42baef5b672cffaa,2025-06-18T13:46:52.973000
CVE-2025-38083,1,1,e8a5f6801ffa63a70575648d241ba6bf9ddbf0df3ee98f60ced9434328833a0c,2025-06-20T12:15:21.470000
CVE-2025-3809,0,0,b0f7ce143ffe6fc36f9bbc17873d1316b0e5d9337b65e2cd57e88fbec5f74a76,2025-04-21T14:23:45.950000
CVE-2025-3810,0,0,969f6ac87070c4164f54ddbb008c2e0ea10a92995f12f2bba35fa71773ee21b8,2025-05-21T14:39:49.083000
CVE-2025-38104,0,0,95fa066b9b297f0f71658bda9667ee4683e7719a8295e0ac6102597f6b2d67e5,2025-04-21T14:23:45.950000
@ -294956,6 +294957,7 @@ CVE-2025-4098,0,0,c3d876ba0075045c7b4d4f0cde2463861d6f50b3f862fa37275045a58fd42c
CVE-2025-4099,0,0,c24d719d1b6efaf6dca2a20eacc9c261b731d2019f4de35e18539c4a75aa9e38,2025-05-19T11:49:08.097000
CVE-2025-4100,0,0,f77bad4e79dd995e69fb9df2c2feed5b3f15d25f3ec0714aaa9ab5523a58223e,2025-05-02T13:53:40.163000
CVE-2025-4101,0,0,481e3ee81d9ced511d86706ddbf21e16ba7244b1e206df435d80c8013121d01e,2025-05-28T13:28:20.060000
CVE-2025-4102,1,1,49e190011ea06d0a4cbd2f343a21a3e913656b5694d4bc320c23f8939dd7f424,2025-06-20T12:15:22.140000
CVE-2025-4103,0,0,95ffd1bbbd8b91948da068554f13130bbdb49af71cd7a23c1f27918b987446dc,2025-06-02T17:32:17.397000
CVE-2025-4104,0,0,9db1e5ec3f96560cc3897212bafef6028f8660c26f74adb7629202cb67ed1418,2025-05-07T14:13:20.483000
CVE-2025-4105,0,0,d83c883af821015dcb99b208032280c6927f7d2df054e268c6ed4d5c2ae83140,2025-05-21T20:24:58.133000
@ -295609,7 +295611,7 @@ CVE-2025-4493,0,0,68c76c6c662ffa6d0b165fd473ec10bcb58eca28ca884631899ab57537d7fb
CVE-2025-4494,0,0,4090430542be5d6bf4417132a052ad7b31d9657bd2d54916650104b0312a7af0,2025-05-12T17:32:32.760000
CVE-2025-4495,0,0,e1ec0d22150b1501540e0c3fc968d724dad47e0b93835a3f72f55ed8fce06bc0,2025-05-12T17:32:32.760000
CVE-2025-44951,0,0,775f1c2e0d6fc9697cfc0b019befddcd6598c60432296b0950cd4d6aaaab599c,2025-06-18T18:15:25.127000
CVE-2025-44952,0,0,28954225d1db559f1c3463e6fe06ecdc313ea20e8be5353dcc36f4f226b21845,2025-06-18T19:15:21.670000
CVE-2025-44952,0,1,398dd66692ea325833ac95bb8d65c08ba75e0ed77fd1bf43249128f264d26a6c,2025-06-20T13:15:19.377000
CVE-2025-4496,0,0,99487213f8b93f0b6b7cef6d42bd7ef81b514f5819f3e5a5a78cb7ece5e3c1cb,2025-05-12T20:15:21.607000
CVE-2025-4497,0,0,30411b6bd5dc595a3ad840654acc0d56c63d2789cbbb011434c59c55d930dc4a,2025-05-16T14:51:43.850000
CVE-2025-4498,0,0,fe4e54354871751f165270510115e7eb077cabbe51e36c7351729c7c48e0bb33,2025-05-28T19:22:10.897000
@ -295706,7 +295708,7 @@ CVE-2025-4551,0,0,e62bf61f9a50bc35d6f8f1a4d686783fd03a31ab6c49d396a836e94321ab5d
CVE-2025-45513,0,0,75d2d23377bdf3eb34768546535e2634c77460ec9fb3e1dbc5e6d7c5335e2cb6,2025-05-24T00:51:51.153000
CVE-2025-45514,0,0,a0097e631e2f67ebed1594ab343f4868011705c17a9a818d4cf23fb2040b09ab,2025-05-27T14:22:03.193000
CVE-2025-4552,0,0,78d43dd6fb452cd4c88c9ba8880aef53f1ef01b609cdfafec2c65ebbd9c2ca4a,2025-05-12T17:32:32.760000
CVE-2025-45525,0,0,2cce186b02deee2fc2ec0d5ac5225a92d24cca217901583bb2c86dfd7edcc3fe,2025-06-18T14:15:44.247000
CVE-2025-45525,0,1,d964bbfa3565b6e3c8c91f8b1ef6cff3eca96639573f7a1a53ee29de90662ea9,2025-06-20T12:15:21.780000
CVE-2025-45526,0,0,f72eeed659a8027250b12d631897056fbfbfe8e6b44f159bff91751ee9f25441,2025-06-18T19:15:21.853000
CVE-2025-45529,0,0,e167386bb5394c534585ea5a04f1a046eac90f4928a6eeb5d60ef274f5e67c1c,2025-05-28T15:01:30.720000
CVE-2025-4553,0,0,cc42244e3fcc3fa0e4735902b7107755da4e8cf945b2a43e81a0e7fb4c007005,2025-05-16T17:08:50.060000
@ -295790,7 +295792,7 @@ CVE-2025-45866,0,0,48c16ba2c1a450558a2d650800240d515297efe6c8338a7502e000a11c7cf
CVE-2025-45867,0,0,a78de81cad59bbc316e2ff4eacf13da0ca81d5efbf89eb838fbfcc576cba1eb1,2025-06-17T19:39:47.240000
CVE-2025-45878,0,0,6b615553fc01027582e83444469fbebd12926b528a6fd0f4487cffdba07fc964,2025-06-19T01:16:08.927000
CVE-2025-45879,0,0,a523ea1be4f66a907ee86b9ebd07662f0a00641a69e4600b6fb7654b16a506de,2025-06-19T01:17:35.180000
CVE-2025-45880,0,1,d6009e96847d0cc665e67c44e11ad18e8a6fe1f096c5d31794e5f5262a109ea4,2025-06-20T11:16:37.750000
CVE-2025-45880,0,0,d6009e96847d0cc665e67c44e11ad18e8a6fe1f096c5d31794e5f5262a109ea4,2025-06-20T11:16:37.750000
CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000
CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000
CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000
@ -297266,7 +297268,7 @@ CVE-2025-48444,0,0,0e4de6e8e030ad68311932d4780942aede2a0fb634a84e5559db70a694c94
CVE-2025-48445,0,0,96b1fe0765b438e1236114a689380bba02d1b61da5239c8cceb1155584335844,2025-06-16T16:39:41.290000
CVE-2025-48446,0,0,41993d47a1ee75bafd902feb9e87cb6a3198f4af6eb3276d99dd0a59546b95c9,2025-06-16T16:38:19.400000
CVE-2025-48447,0,0,ef527cdf1b6532b1734aaf1a53da6542b6abec29ccf796ab3f58f78f938951a3,2025-06-12T16:06:20.180000
CVE-2025-48448,0,0,a0191a165e845d5e4f32089763ab3c318feb483db08ab0e373929636853715f9,2025-06-12T16:06:20.180000
CVE-2025-48448,0,1,d45e98596ff7c4bfe1172c4147c3bf90df1269483f2072c8e1e6cb8ccc1b62bf,2025-06-20T13:06:18.167000
CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000
CVE-2025-4846,0,0,567ea58beeefb674198c2f090a4debb893b74f8f25c0b605e548238fa1a18edc,2025-05-19T13:35:20.460000
CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000
@ -297530,7 +297532,7 @@ CVE-2025-49138,0,0,8c9222e6db28a0722fcd86b0c6153a24f83a1107e7a502e6df61b7751665b
CVE-2025-49139,0,0,b9493e74784ee5e52c26c4cdb9554b4742092b8fa178182c6bb1db851c96f73d,2025-06-12T16:06:47.857000
CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000
CVE-2025-49140,0,0,33373d8e5750f1f5a2b78f68284d24e09f01be72429fc9c13dc982e8c56d2cb3,2025-06-12T16:06:47.857000
CVE-2025-49141,0,0,e1f92306ab9fd3d73867c2aa9f448efb6645654c0788fd52bbdc6ffcf906feba,2025-06-12T16:06:47.857000
CVE-2025-49141,0,1,ebbeba22ec3c8bd2a7e1c9c6c74b1708c3942fe9954e98a2634e536d5356e888,2025-06-20T13:43:48.103000
CVE-2025-49142,0,0,41188906e2e357ed545217831b9fe6ff5a3bf2332267c22eb7e3625fae9f52f1,2025-06-12T16:06:39.330000
CVE-2025-49143,0,0,f4eeb95d1c1d44e21a5fc96f8952099f90b0864e5b98bced44a49fab091919bb,2025-06-12T16:06:39.330000
CVE-2025-49146,0,0,a352cc011ba361436b876cbd0ba26f98777672335f155f665e464243f2d6320b,2025-06-12T16:06:20.180000
@ -297802,7 +297804,7 @@ CVE-2025-49794,0,0,fb1efdcc8bcb343302868601f600bbbb7fce96a3ab5152faaf6b18dcb3cfc
CVE-2025-49795,0,0,4c770467268ebf148fa0f28383caf66af5bf08e634296e0cb4c455afa6e9b153,2025-06-17T20:50:23.507000
CVE-2025-49796,0,0,c3ae5367828207e03498fac8ae67ddfb08b0af4ece3b2500316915ff59e84375,2025-06-17T20:50:23.507000
CVE-2025-4980,0,0,b34e85986066032f97fe34d8a927fed77ce8edee3293780d83eab3188141a736,2025-06-12T16:21:08.950000
CVE-2025-4981,1,1,9e3b6c65637183d0f543a6f645c7cd8361722bd26a2a7327fec0b7799c23a883,2025-06-20T11:15:20.993000
CVE-2025-4981,0,0,9e3b6c65637183d0f543a6f645c7cd8361722bd26a2a7327fec0b7799c23a883,2025-06-20T11:15:20.993000
CVE-2025-49814,0,0,cd4c594b4458e6b3d192baa2131b995abe59dca872f59a22339c83ab6246bc09,2025-06-12T03:15:25.863000
CVE-2025-49815,0,0,ab5c799920620d5e4f9d9b43a2af946d17b69db748ce4d8b6a328cb8d7b9eff6,2025-06-12T03:15:25.930000
CVE-2025-49816,0,0,1a16c5d0bd92adeb24c6c00f18c773a3281420da1014560ce74b2134aedf4c77,2025-06-12T03:15:25.993000
@ -298079,7 +298081,7 @@ CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b
CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000
CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000
CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000
CVE-2025-5255,1,1,0d9f56d5e1509a662651a50a1959d77ed1c049a1471df3ec7483fe3801248464,2025-06-20T10:15:21.653000
CVE-2025-5255,0,0,0d9f56d5e1509a662651a50a1959d77ed1c049a1471df3ec7483fe3801248464,2025-06-20T10:15:21.653000
CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000
CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000
CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000
@ -298565,7 +298567,7 @@ CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f6297
CVE-2025-5926,0,0,d101bf01d3fcfe0cdb9553376422f17ca8d863b6b3e856d7675080f3ca9408fd,2025-06-16T12:32:18.840000
CVE-2025-5928,0,0,bf8e560b30d16961d3816817e86769462398f4dfd1c11ce3fc0a5a6f046bebeb,2025-06-16T12:32:18.840000
CVE-2025-5930,0,0,f247db24f36bcbf2f7d81e18a82d068f64b444dc019b1b0b868d92f5ff3fa36b,2025-06-16T12:32:18.840000
CVE-2025-5934,0,0,5a584e0d1bbfc15c499b678855c67e63bc7743a9d91ed869cbc591e77e991d9e,2025-06-12T16:06:39.330000
CVE-2025-5934,0,1,2b04aea49be1b2e817d664c8d52ff126b146b95757a60bd9875f5715a4755cac,2025-06-20T13:11:11.560000
CVE-2025-5935,0,0,c15a5d20553ffc7a7c30ae68f0e5f38be384091a8a588ccb546a6d6a87a9c526,2025-06-12T16:06:39.330000
CVE-2025-5938,0,0,de6ba49470711279279f27a904465957f8293ec15c3176c20b2597289d4c7b40,2025-06-16T12:32:18.840000
CVE-2025-5939,0,0,fae4e42cb7ec096d2eda48ac42042deaadc4d81bda29462ec7008261e2cabbf5,2025-06-16T12:32:18.840000
@ -298575,7 +298577,7 @@ CVE-2025-5950,0,0,760fa6d42f3c866c98b5e3438e6c6f00bd5fd5520537943b3e544b07838ccb
CVE-2025-5952,0,0,80f5810e94a735443b1add4b87f50d30096f6ed0c46ddf37bebc56b27e945b75,2025-06-12T16:06:39.330000
CVE-2025-5958,0,0,a36b78799dbbd1551f96c1bff1614591c13905c454c0b07d9b02e19316c76c99,2025-06-16T14:50:15.493000
CVE-2025-5959,0,0,a39e129e58512bcee45e4710589bda0209f85db251e85a57b71fd6de1e661083,2025-06-16T14:49:13.623000
CVE-2025-5963,1,1,b4a454d0519516928c1b46261496454b37a96759ff7ef9683b3e1a5c5e15bd77,2025-06-20T10:15:22.450000
CVE-2025-5963,0,0,b4a454d0519516928c1b46261496454b37a96759ff7ef9683b3e1a5c5e15bd77,2025-06-20T10:15:22.450000
CVE-2025-5964,0,0,fdc2a55a5a19378f1914fbf75b6cbe370c921fe75e327e1cb5f217f1b15bf1ea,2025-06-16T12:32:18.840000
CVE-2025-5969,0,0,c1cc21e3e671c92cd4500d184398151db62163dec64f67d18a86b28ac5130697,2025-06-12T16:06:29.520000
CVE-2025-5970,0,0,c0dffa88245f943ccee6014f6c262b234873584bcf552256828e546681f676da,2025-06-17T20:35:26.663000
@ -298600,8 +298602,8 @@ CVE-2025-5996,0,0,6d836d2b7cc11df634eb3440d15936d2a06ec9995d3d02eb7a9226ed3b7059
CVE-2025-6001,0,0,6947a76225acd2e0352dafdcc9d8c8832898e935ce2588bd16c7b63b5eaaea42,2025-06-12T16:06:20.180000
CVE-2025-6002,0,0,c3342aafede1398b2d7e7cc8f4c9f889ab7afc3c4ac6360898dd2f7299f1feb2,2025-06-12T16:06:20.180000
CVE-2025-6003,0,0,13a477a4b87366b3fef1966498d6d8c821ce2e26bf2366c0e56fb46b20ebdcb5,2025-06-12T16:06:20.180000
CVE-2025-6005,0,0,2cf44564776f402947a17c91be3717b20ba7071fdb538dc73eff857dfd935e96,2025-06-12T16:06:20.180000
CVE-2025-6006,0,0,f3890d678b52a65bb188746bd2b72b04830e80f4fcc6e370b4f5f482a5c89435,2025-06-12T16:06:20.180000
CVE-2025-6005,0,1,9a2ac8246f422ef5614eb749e32675eaa624d97ea333814ae3828209772ff515,2025-06-20T12:48:20.400000
CVE-2025-6006,0,1,7a386c846906f2e1152f82f788f56ad0aa39222b613fc15254d86bd6e33a6943,2025-06-20T12:46:43.687000
CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399f2,2025-06-19T01:26:45.850000
CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
@ -298776,12 +298778,17 @@ CVE-2025-6320,0,0,cfca14f11f77817e455b8985e156b72a57e75723c14e788de676b3474335d0
CVE-2025-6321,0,0,45b85826f69f9b20b5f18a50cf8054f2804f9b4c52bda56b55831aabb57e9a5e,2025-06-20T09:15:23.263000
CVE-2025-6322,0,0,984534c0d89be480f4c341a04b39b1a76b03c51dd9fd32ada90d349a5458c493,2025-06-20T09:15:23.470000
CVE-2025-6323,0,0,2325c89f764e5cf1aba7e901911845db762d6b79f64ce2b414ad5775ef74b0b4,2025-06-20T09:15:23.687000
CVE-2025-6328,1,1,a6cd2ae338d4b0348c9fa936f5f5a0a1cb9d6b4d0dd551cbf698cf9e6fc2f2fd,2025-06-20T10:15:22.593000
CVE-2025-6329,1,1,88e0ef33af4befefa94d4a0892be0d22239e258bb7c0028d42fd0b32601cea10,2025-06-20T10:15:22.820000
CVE-2025-6330,1,1,ecf44e88c7f030601d5c8c1085a7e592714a64b6b2c443b689796f384a002ebd,2025-06-20T10:15:23.030000
CVE-2025-6331,1,1,7e32ab025f1c553162a30b731d455d4fbbbd83e85cdc673d94990c5b5d3548dd,2025-06-20T10:15:23.210000
CVE-2025-6332,1,1,157254ee9c1a9e78b38faa1baa847263de8821d0bcc516eb25fb1c1e0f442eb7,2025-06-20T11:15:21.693000
CVE-2025-6333,1,1,8432935305658bf7f53cb38ba171dd9a89fdcb085ef1baeaaf3777ba4464ff81,2025-06-20T11:15:21.897000
CVE-2025-6334,1,1,385b6c0c02914e133b547b7a816a7d1b29538ddb323af001ca349db1874bed97,2025-06-20T11:15:22.083000
CVE-2025-6335,1,1,df6aca41afcec287dc2b1bb94b2e480289dc6df8fa0196ef481a0da251862d55,2025-06-20T11:15:22.277000
CVE-2025-6328,0,0,a6cd2ae338d4b0348c9fa936f5f5a0a1cb9d6b4d0dd551cbf698cf9e6fc2f2fd,2025-06-20T10:15:22.593000
CVE-2025-6329,0,0,88e0ef33af4befefa94d4a0892be0d22239e258bb7c0028d42fd0b32601cea10,2025-06-20T10:15:22.820000
CVE-2025-6330,0,0,ecf44e88c7f030601d5c8c1085a7e592714a64b6b2c443b689796f384a002ebd,2025-06-20T10:15:23.030000
CVE-2025-6331,0,0,7e32ab025f1c553162a30b731d455d4fbbbd83e85cdc673d94990c5b5d3548dd,2025-06-20T10:15:23.210000
CVE-2025-6332,0,0,157254ee9c1a9e78b38faa1baa847263de8821d0bcc516eb25fb1c1e0f442eb7,2025-06-20T11:15:21.693000
CVE-2025-6333,0,0,8432935305658bf7f53cb38ba171dd9a89fdcb085ef1baeaaf3777ba4464ff81,2025-06-20T11:15:21.897000
CVE-2025-6334,0,0,385b6c0c02914e133b547b7a816a7d1b29538ddb323af001ca349db1874bed97,2025-06-20T11:15:22.083000
CVE-2025-6335,0,0,df6aca41afcec287dc2b1bb94b2e480289dc6df8fa0196ef481a0da251862d55,2025-06-20T11:15:22.277000
CVE-2025-6336,1,1,f4eb154f7c258702c6327f6b4e73224788ac11d716997f253b43b97e9a702754,2025-06-20T12:15:22.307000
CVE-2025-6337,1,1,f1c5d9ea367718920479e38e5de431754a07a5c8f8a895e4849116654bfecca6,2025-06-20T12:15:22.517000
CVE-2025-6339,1,1,11f9177d62160ec36ccfbe7eda54190658af7678f69a6ae1ba5dc1e31395b9bf,2025-06-20T12:15:22.710000
CVE-2025-6340,1,1,e5b8b0b30b1a020c3affea96559149265ed70b59e6654241dc99ca5da3786747,2025-06-20T13:15:19.790000
CVE-2025-6341,1,1,adab35555139f61b79c693a1325165251bedb5ca5f910a6a928f847521ee1d45,2025-06-20T13:15:19.980000
CVE-2025-6384,0,0,5cdec51953ac45fb27a9189069c1d2dedd736d67cb8696f7a629dd1dd7d1191f,2025-06-19T21:15:27.390000

Can't render this file because it is too large.