diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38824.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38824.json new file mode 100644 index 00000000000..f345ff2035c --- /dev/null +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38824.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-38824", + "sourceIdentifier": "security@vmware.com", + "published": "2025-06-13T08:15:18.800", + "lastModified": "2025-06-13T08:15:18.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.8 + } + ] + }, + "references": [ + { + "url": "https://docs.saltproject.io/en/3006/topics/releases/3006.12.html", + "source": "security@vmware.com" + }, + { + "url": "https://docs.saltproject.io/en/3007/topics/releases/3007.4.html", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55585.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55585.json index feadce8416c..979e0b708c1 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55585.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55585.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55585", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-07T19:15:22.333", - "lastModified": "2025-06-09T12:15:47.880", + "lastModified": "2025-06-13T08:15:19.127", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -85,6 +85,10 @@ { "url": "https://mops.eu", "source": "cve@mitre.org" + }, + { + "url": "https://www.mops.eu", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36506.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36506.json new file mode 100644 index 00000000000..becb1bb5d56 --- /dev/null +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36506.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-36506", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-06-13T09:15:19.223", + "lastModified": "2025-06-13T09:15:19.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "External control of file name or path issue exists in RICOH Streamline NX V3 PC Client versions 3.5.0 to 3.242.0. If an attacker sends a specially crafted request, arbitrary files in the file system can be overwritten with log data." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN27937557/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000004", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-392xx/CVE-2025-39240.json b/CVE-2025/CVE-2025-392xx/CVE-2025-39240.json new file mode 100644 index 00000000000..093492df563 --- /dev/null +++ b/CVE-2025/CVE-2025-392xx/CVE-2025-39240.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-39240", + "sourceIdentifier": "hsrc@hikvision.com", + "published": "2025-06-13T08:15:19.377", + "lastModified": "2025-06-13T08:15:19.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Some Hikvision Wireless Access Point are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hsrc@hikvision.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/remote-command-execution-vulnerability-in-some-hikvision-wireless-access-point/", + "source": "hsrc@hikvision.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-467xx/CVE-2025-46783.json b/CVE-2025/CVE-2025-467xx/CVE-2025-46783.json new file mode 100644 index 00000000000..dcbd3491ac7 --- /dev/null +++ b/CVE-2025/CVE-2025-467xx/CVE-2025-46783.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-46783", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-06-13T09:15:19.620", + "lastModified": "2025-06-13T09:15:19.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal vulnerability exists in RICOH Streamline NX V3 PC Client versions 3.5.0 to 3.242.0. If this vulnerability is exploited, arbitrary code may be executed on the PC where the product is running by tampering with specific files used on the product." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN27937557/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000005", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48825.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48825.json new file mode 100644 index 00000000000..ba73009ef5b --- /dev/null +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48825.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-48825", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-06-13T09:15:19.937", + "lastModified": "2025-06-13T09:15:19.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RICOH Streamline NX V3 PC Client versions 3.5.0 to 3.7.0 contains an issue with use of less trusted source, which may allow an attacker who can conduct a man-in-the-middle attack to eavesdrop upgrade requests and execute a malicious DLL with custom code." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-348" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN27937557/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000006", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49182.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49182.json index a341889cacc..0a905c9978c 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49182.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49182.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49182", "sourceIdentifier": "psirt@sick.de", "published": "2025-06-12T14:15:30.437", - "lastModified": "2025-06-12T16:06:20.180", + "lastModified": "2025-06-13T09:15:20.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -42,7 +42,7 @@ "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-540" } ] } diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49186.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49186.json index 35acdd565ca..17764d95dff 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49186.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49186.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49186", "sourceIdentifier": "psirt@sick.de", "published": "2025-06-12T14:15:31.013", - "lastModified": "2025-06-12T16:06:20.180", + "lastModified": "2025-06-13T09:15:20.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -42,7 +42,7 @@ "description": [ { "lang": "en", - "value": "CWE-79" + "value": "CWE-307" } ] } diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6012.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6012.json new file mode 100644 index 00000000000..893f0517f84 --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6012.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6012", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-13T08:15:19.507", + "lastModified": "2025-06-13T08:15:19.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Auto Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.svn.wordpress.org/auto-attachments/trunk/auto-attachments.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/978c13e5-d30c-4caa-ab6d-256f2517fd79?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index da5d79b9bd0..943cbbfa78b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-13T08:00:19.160782+00:00 +2025-06-13T10:00:20.209956+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-13T07:15:22.663000+00:00 +2025-06-13T09:15:20.383000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297872 +297878 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `6` -- [CVE-2024-38822](CVE-2024/CVE-2024-388xx/CVE-2024-38822.json) (`2025-06-13T07:15:19.300`) -- [CVE-2024-38823](CVE-2024/CVE-2024-388xx/CVE-2024-38823.json) (`2025-06-13T07:15:20.580`) -- [CVE-2024-38825](CVE-2024/CVE-2024-388xx/CVE-2024-38825.json) (`2025-06-13T07:15:20.717`) -- [CVE-2025-22236](CVE-2025/CVE-2025-222xx/CVE-2025-22236.json) (`2025-06-13T07:15:20.863`) -- [CVE-2025-22237](CVE-2025/CVE-2025-222xx/CVE-2025-22237.json) (`2025-06-13T07:15:21.010`) -- [CVE-2025-22238](CVE-2025/CVE-2025-222xx/CVE-2025-22238.json) (`2025-06-13T07:15:21.150`) -- [CVE-2025-22239](CVE-2025/CVE-2025-222xx/CVE-2025-22239.json) (`2025-06-13T07:15:21.290`) -- [CVE-2025-22240](CVE-2025/CVE-2025-222xx/CVE-2025-22240.json) (`2025-06-13T07:15:21.430`) -- [CVE-2025-22241](CVE-2025/CVE-2025-222xx/CVE-2025-22241.json) (`2025-06-13T07:15:21.567`) -- [CVE-2025-22242](CVE-2025/CVE-2025-222xx/CVE-2025-22242.json) (`2025-06-13T07:15:21.710`) -- [CVE-2025-4227](CVE-2025/CVE-2025-42xx/CVE-2025-4227.json) (`2025-06-13T06:15:22.253`) -- [CVE-2025-4229](CVE-2025/CVE-2025-42xx/CVE-2025-4229.json) (`2025-06-13T06:15:22.490`) -- [CVE-2025-5923](CVE-2025/CVE-2025-59xx/CVE-2025-5923.json) (`2025-06-13T07:15:22.663`) +- [CVE-2024-38824](CVE-2024/CVE-2024-388xx/CVE-2024-38824.json) (`2025-06-13T08:15:18.800`) +- [CVE-2025-36506](CVE-2025/CVE-2025-365xx/CVE-2025-36506.json) (`2025-06-13T09:15:19.223`) +- [CVE-2025-39240](CVE-2025/CVE-2025-392xx/CVE-2025-39240.json) (`2025-06-13T08:15:19.377`) +- [CVE-2025-46783](CVE-2025/CVE-2025-467xx/CVE-2025-46783.json) (`2025-06-13T09:15:19.620`) +- [CVE-2025-48825](CVE-2025/CVE-2025-488xx/CVE-2025-48825.json) (`2025-06-13T09:15:19.937`) +- [CVE-2025-6012](CVE-2025/CVE-2025-60xx/CVE-2025-6012.json) (`2025-06-13T08:15:19.507`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `3` -- [CVE-2024-6538](CVE-2024/CVE-2024-65xx/CVE-2024-6538.json) (`2025-06-13T06:15:21.310`) +- [CVE-2024-55585](CVE-2024/CVE-2024-555xx/CVE-2024-55585.json) (`2025-06-13T08:15:19.127`) +- [CVE-2025-49182](CVE-2025/CVE-2025-491xx/CVE-2025-49182.json) (`2025-06-13T09:15:20.130`) +- [CVE-2025-49186](CVE-2025/CVE-2025-491xx/CVE-2025-49186.json) (`2025-06-13T09:15:20.383`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 43964ec4ba7..0dfe4ee214f 100644 --- a/_state.csv +++ b/_state.csv @@ -264631,9 +264631,10 @@ CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf0 CVE-2024-3882,0,0,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921af,2025-01-27T16:24:52.420000 CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000 -CVE-2024-38822,1,1,1de129502c834593a380596e49c11c4c982d91761db595315325ff60e1f44ece,2025-06-13T07:15:19.300000 -CVE-2024-38823,1,1,b63f600119babfcd1b88d3b66789bd9b95c29f7b7675d097c00a7d24aff9b414,2025-06-13T07:15:20.580000 -CVE-2024-38825,1,1,203649d9550a3a16e86d52bd19d99320fe94919f9798485742bccd2920441720,2025-06-13T07:15:20.717000 +CVE-2024-38822,0,0,1de129502c834593a380596e49c11c4c982d91761db595315325ff60e1f44ece,2025-06-13T07:15:19.300000 +CVE-2024-38823,0,0,b63f600119babfcd1b88d3b66789bd9b95c29f7b7675d097c00a7d24aff9b414,2025-06-13T07:15:20.580000 +CVE-2024-38824,1,1,54e57dcf925789c6c00c49d9811baccd3488b72aef696e2d154306781f58b0a3,2025-06-13T08:15:18.800000 +CVE-2024-38825,0,0,203649d9550a3a16e86d52bd19d99320fe94919f9798485742bccd2920441720,2025-06-13T07:15:20.717000 CVE-2024-38826,0,0,506930d335a5efb8c27d5014fa191907479a7be8d8701e39690034739d2c8ebb,2025-03-17T22:15:12.667000 CVE-2024-38827,0,0,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000 CVE-2024-38828,0,0,30ca64d92e91bdd0f728034345a0be072d18df3b4628bfb9f9d8fb65850f39eb,2025-05-09T20:15:38.413000 @@ -276811,7 +276812,7 @@ CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb643164424 CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000 CVE-2024-55581,0,0,c4461aeefe710b8127c139746d541669508c4f036fc04415a5c2df9466c650ae,2025-04-07T18:39:22.837000 CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000 -CVE-2024-55585,0,0,63af7fe272df8dfd7051e22f6478ef78915d30c921c3f7c1479cb5a0fa0f2941,2025-06-09T12:15:47.880000 +CVE-2024-55585,0,1,10db4abe2df25dafa61974320d02f386f6536dda492088dc02ec05c47bc9210b,2025-06-13T08:15:19.127000 CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000 CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000 CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000 @@ -279177,7 +279178,7 @@ CVE-2024-6533,0,0,7c76cd0497295bcea8ddaf17ea367bd3231a092d4f1d355ad959ac1bbed5a9 CVE-2024-6534,0,0,77773ba8637f01892ca3f6641fe8442e5c6280672a181b114b53032c7b4aca6d,2025-05-19T19:15:47.540000 CVE-2024-6535,0,0,44388289212b949983bbcb08fc4f387d14a7864b80be8ec8b5ccdce879cce735,2024-11-21T09:49:49.560000 CVE-2024-6536,0,0,9aad41cc349130329c2772e0fffacd9b3eaf7684c2688938e6febfa55873b1aa,2025-06-10T16:01:07.250000 -CVE-2024-6538,0,1,6d82343325e81c013352d2562f399e546a618b1a220613b9be07ff00c7b0d628,2025-06-13T06:15:21.310000 +CVE-2024-6538,0,0,6d82343325e81c013352d2562f399e546a618b1a220613b9be07ff00c7b0d628,2025-06-13T06:15:21.310000 CVE-2024-6539,0,0,488f82b4dd195018a4571a7b41599ab86771c19553aea6769341658d3043c227,2024-11-21T09:49:50.707000 CVE-2024-6540,0,0,f3ea6a455e292a17968899748da95526cfa3d10fdcac7853f32fce07f60e60be,2024-11-21T09:49:50.857000 CVE-2024-6542,0,0,95c08c38ec0cfe53af1e3f2fc6b95f2c5e43a181678f8155f2d77a836dccc44c,2024-11-21T09:49:50.997000 @@ -285594,14 +285595,14 @@ CVE-2025-22231,0,0,bd2ff59ef079880253edeca06616e1c3a205871c44a51a92d95e60e549741 CVE-2025-22232,0,0,bee762df9dfabd3d4c6c12e64136a19453238ca07b81d2e49eee527157bf661b,2025-04-11T15:39:52.920000 CVE-2025-22233,0,0,50310437fe70f8c52d32549c7a5d723959e232fe0d070a21f27a0de47dd17286,2025-05-19T13:35:20.460000 CVE-2025-22235,0,0,9096c227dda3418e3d7b103b041dc8b2cd855202b867daccc1ae1ca882f5e87f,2025-05-16T23:15:19.600000 -CVE-2025-22236,1,1,bad9dcdfda94f7a8f14a9c4731a292403c77a2168042ee3ca100497826fa0d7c,2025-06-13T07:15:20.863000 -CVE-2025-22237,1,1,ed2d36b751c7eb47c87b1b491b96361d88ded4587852c55ecee7748dce17ebdc,2025-06-13T07:15:21.010000 -CVE-2025-22238,1,1,744f7cb49315bcf250df707bd1788f0a0498030a8448d1ac297859a373023324,2025-06-13T07:15:21.150000 -CVE-2025-22239,1,1,e8f6f773eb349551c67372dd50e5396f644a698e9473b9dee2f890c0966ae7f9,2025-06-13T07:15:21.290000 +CVE-2025-22236,0,0,bad9dcdfda94f7a8f14a9c4731a292403c77a2168042ee3ca100497826fa0d7c,2025-06-13T07:15:20.863000 +CVE-2025-22237,0,0,ed2d36b751c7eb47c87b1b491b96361d88ded4587852c55ecee7748dce17ebdc,2025-06-13T07:15:21.010000 +CVE-2025-22238,0,0,744f7cb49315bcf250df707bd1788f0a0498030a8448d1ac297859a373023324,2025-06-13T07:15:21.150000 +CVE-2025-22239,0,0,e8f6f773eb349551c67372dd50e5396f644a698e9473b9dee2f890c0966ae7f9,2025-06-13T07:15:21.290000 CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000 -CVE-2025-22240,1,1,655afd2639c4bff34f05eb0523980a3eb290c4439f682aac852047fd7d81b7d6,2025-06-13T07:15:21.430000 -CVE-2025-22241,1,1,5f9646794e52bdbc3f490b3330e1f9c68ea5ffdfa0df29aae7c5e61961ca5b57,2025-06-13T07:15:21.567000 -CVE-2025-22242,1,1,b8a6fb1b6e8de9a5a97438f1176658027665c59502c2549ed9c21537b7ef446a,2025-06-13T07:15:21.710000 +CVE-2025-22240,0,0,655afd2639c4bff34f05eb0523980a3eb290c4439f682aac852047fd7d81b7d6,2025-06-13T07:15:21.430000 +CVE-2025-22241,0,0,5f9646794e52bdbc3f490b3330e1f9c68ea5ffdfa0df29aae7c5e61961ca5b57,2025-06-13T07:15:21.567000 +CVE-2025-22242,0,0,b8a6fb1b6e8de9a5a97438f1176658027665c59502c2549ed9c21537b7ef446a,2025-06-13T07:15:21.710000 CVE-2025-22243,0,0,5f41737989264b2994eac99e02c12b9f81310f29baab0cf31082285d453e8c22,2025-06-05T20:12:23.777000 CVE-2025-22244,0,0,936e256b7445af372dfb2e4aaecfd0a0bba17d1084c3b4137448313a9b74ae16,2025-06-05T20:12:23.777000 CVE-2025-22245,0,0,4cf32386b47e50dd7150971af187d1237c885530e9e4973c20a0d2525573c96a,2025-06-05T20:12:23.777000 @@ -293451,6 +293452,7 @@ CVE-2025-3645,0,0,5320ad93e35344910c21a67f764477dae50463a61312eda5cb948a8a0d2e4f CVE-2025-3647,0,0,d085366814e191fa929649b449c3c94db9fdfb290fac2614b251f62d5616efc9,2025-04-29T13:52:28.490000 CVE-2025-3649,0,0,df5be861cb9901de2ff346df6053edd181ced31f9d06ef10ebd9788e09b37197,2025-06-05T14:27:28.437000 CVE-2025-36504,0,0,30afeffa7b8ef5e478f29856811f9be90f1ece9e22dbe373c856a36c842492cb,2025-05-08T14:39:09.683000 +CVE-2025-36506,1,1,61b274ed16b988d85df1f6f5598cf0d5025c6ac8685dc33bec7f148d553b5a3f,2025-06-13T09:15:19.223000 CVE-2025-3651,0,0,30e087cb1671b81c1bf0c1d2a4d51e77f706a32948b7aa67dbe7688506dce698,2025-04-17T20:21:48.243000 CVE-2025-36513,0,0,40997ded6ccfa9f42a498c7fa3aba63677e185863eb779042a0e6b33a18b51a9,2025-06-06T14:07:28.330000 CVE-2025-36521,0,0,76dbe5c9e005eebc45d03f4e270884a68d88e62c1e707e433be80dfc20224dd6,2025-05-02T13:52:51.693000 @@ -293978,6 +293980,7 @@ CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee CVE-2025-3921,0,0,9797fba579692252283cd90745f54a1a6a5a7131fc66f684fa524a93339f9b2c,2025-05-07T14:13:20.483000 CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000 CVE-2025-3924,0,0,7b87f51ca3c311667e1b7a4df04e30967e599dbb013055d4845862729654e283,2025-05-07T14:13:20.483000 +CVE-2025-39240,1,1,a02bb3c33521d2058c91a6ee65ad6c626da80958654a707237bc909c3ce4c2a0,2025-06-13T08:15:19.377000 CVE-2025-3925,0,0,a768d137ba057feede97294fe198f51837b892f84c1c07da5c135848de68ae8c,2025-05-08T14:39:09.683000 CVE-2025-3927,0,0,9e086b56a440dad42f434266e45a7a3a4ae08576665cc376b0af581930ff5e7c,2025-05-12T16:15:24.823000 CVE-2025-3928,0,0,b8f573bcf4c9f6295f3b239508ff59d7f2be020729128e557b8061ff337a956f,2025-05-28T20:51:43.700000 @@ -294624,9 +294627,9 @@ CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208b CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000 CVE-2025-4224,0,0,1207737d79a1e90fb6c077a6a1097540732fecbc5b6d096024f04eb01ab32d8d,2025-06-04T14:54:33.783000 CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000 -CVE-2025-4227,1,1,0cba43ce0ea1b24f0c363631becf569fb38d5a5a4940ee66b41b4dc46019f2a6,2025-06-13T06:15:22.253000 +CVE-2025-4227,0,0,0cba43ce0ea1b24f0c363631becf569fb38d5a5a4940ee66b41b4dc46019f2a6,2025-06-13T06:15:22.253000 CVE-2025-4228,0,0,554b1a6f1624f5ff21aabcc2ba5fe6664bfd45b472d87eab77b50fd6cdf9b337,2025-06-13T00:15:23.233000 -CVE-2025-4229,1,1,33aa712575cd59bef42cfaeb99480be65618e20d2c90202f86fce4479fe87aa2,2025-06-13T06:15:22.490000 +CVE-2025-4229,0,0,33aa712575cd59bef42cfaeb99480be65618e20d2c90202f86fce4479fe87aa2,2025-06-13T06:15:22.490000 CVE-2025-4230,0,0,3bc7d43f6ed17d0222050d5e2a8c149fcb80dc001be4c3f44b9fc2d5f7403e5e,2025-06-13T00:15:23.380000 CVE-2025-4231,0,0,9f35b2b6570c87e4ea9cfe7424c6a624299304be5429d17ab099d4079abf7e0b,2025-06-13T00:15:23.533000 CVE-2025-4232,0,0,7c0d7848e06aeb2ed299e7649a2baf502414476df4b217dd96bdb218f0ad26fa,2025-06-13T00:15:23.697000 @@ -295683,6 +295686,7 @@ CVE-2025-4678,0,0,fbec2b4fac1b4284d4d6bf7d8d38e21016c41ff107ed2c39fcea77d9e718a0 CVE-2025-46780,0,0,5993d506455854cf118c6763aa0e87cfcb5c499499a4d09b9c1fb1cc0884d3f3,2025-04-30T03:15:19.307000 CVE-2025-46781,0,0,e7fe47a74e2ae94a42cb82d6842951a5dd9286ffd4d5d353415d63928d0e29b9,2025-04-30T03:15:19.367000 CVE-2025-46782,0,0,190c817e4f3c09faf97df326ed9cdbea1555cc1850d161b9d9da454d08c1d46e,2025-04-30T03:15:19.430000 +CVE-2025-46783,1,1,79dd23fc392ca9224d73debad68faec2e14cef78c7ee76ce676f8b53bfd26213,2025-06-13T09:15:19.620000 CVE-2025-46785,0,0,37929d48b75dcb8104d52e2202c99878d7f4f635a8670bbd0e6f5af54cd711d3,2025-05-16T14:43:56.797000 CVE-2025-46786,0,0,65c9b4d28548a814ac9da85c56a6b20b3ea8dfdc3f7521c8b14e0368cd0ae6bc,2025-05-16T14:43:56.797000 CVE-2025-4679,0,0,bd384669d27df6a466ec06c3f367687ccacf0536beef14e450b7ad3bf52b421e,2025-05-30T16:59:38.433000 @@ -296807,6 +296811,7 @@ CVE-2025-48798,0,0,3d262ff889de2be849be48f7041ba76705a8181e37409ec772ec9868a5451 CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000 CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000 CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000 +CVE-2025-48825,1,1,48b3b5fd991ab13697bb95c660ad4ff207795a0c3033d56e71348b9e29c61030,2025-06-13T09:15:19.937000 CVE-2025-48827,0,0,bb023efebad659c6b1afc7472a68a4c3fff6995d9544989f2962a9514dad36ed,2025-05-28T15:01:30.720000 CVE-2025-48828,0,0,4552ae9ffef9c0c046834c88e3af4be5924ff2fdbe877524ea921342daa54fb9,2025-05-28T15:01:30.720000 CVE-2025-4883,0,0,5862fdd520821c1eedf697774db7196e34040fbccfc13f239bec6cec686b2e42,2025-05-21T19:38:13.727000 @@ -296965,11 +296970,11 @@ CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 CVE-2025-49181,0,0,421c69caf46d64c85211245857cc50240a1d925eb8f7f6f8f8275071dbcea04d,2025-06-12T16:06:20.180000 -CVE-2025-49182,0,0,b228a68350a504b8d4e55725ccef9e5f30f958d9e26082e4726cc3fbe2b75558,2025-06-12T16:06:20.180000 +CVE-2025-49182,0,1,e8456684e967a6a1e184795e09531c7803eec71e04514d62191e7065481706c5,2025-06-13T09:15:20.130000 CVE-2025-49183,0,0,0715b13572853706431a4f2ccf72fef00b567ab1bb56a0f98125eaa16e7edc70,2025-06-12T16:06:20.180000 CVE-2025-49184,0,0,ac5f9f795f8fac1c8e62e088fdf037968bc9dd920d64a50e4f3ea2d60cc6426d,2025-06-12T16:06:20.180000 CVE-2025-49185,0,0,52f282a54651fac26d2b1ee3543089c47b19de82c1921b62b8ffa20986027a4f,2025-06-12T16:06:20.180000 -CVE-2025-49186,0,0,e4f674c86e56b544e87225c7a880125861a5b536cbee59fdd4b75e2f98be7cf5,2025-06-12T16:06:20.180000 +CVE-2025-49186,0,1,c8042f20acd2791cc3b5da99e19e07f5d6fbc0915e5cd25afe7afe103152a819,2025-06-13T09:15:20.383000 CVE-2025-49187,0,0,90298c6f8b259851242ec73ce90475e67ee1e00f0f2579b08964c04f82fdf639,2025-06-12T16:06:20.180000 CVE-2025-49188,0,0,a04bcc69ec9cf5c0efb712f09d6662a98ccaa8679363aa5e4bff3f4db4d943c9,2025-06-12T16:06:20.180000 CVE-2025-49189,0,0,0be5e382e2cc60d0e0c5db11200b14429dfc5194d0e7d82700ed04155f015c1b,2025-06-12T16:06:20.180000 @@ -297828,7 +297833,7 @@ CVE-2025-5915,0,0,f4817e3f541276db8764595bab47239f1072f31f9c3d32c2caaee3b4950d68 CVE-2025-5916,0,0,77a227907bb56f71f2bfd1bf497899ff1c8f6eb6d2e97956e9c7ee1b79bfbd3d,2025-06-12T16:06:47.857000 CVE-2025-5917,0,0,0b15f8cb6694a25438c80b55bb7a5b265e6faccf484d04cd7c6d5563268713ff,2025-06-12T16:06:47.857000 CVE-2025-5918,0,0,86b80ccf0910833edc22c6b7530445ae3be8c3d5eb7bba766fb3c183b6d35d2b,2025-06-12T16:06:47.857000 -CVE-2025-5923,1,1,06760bc3ae67f1377b7c585ea87c8574a8ff4adaf2fbc96f96b691766f0da645,2025-06-13T07:15:22.663000 +CVE-2025-5923,0,0,06760bc3ae67f1377b7c585ea87c8574a8ff4adaf2fbc96f96b691766f0da645,2025-06-13T07:15:22.663000 CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f629748,2025-06-12T16:06:39.330000 CVE-2025-5926,0,0,94cd88fd66ed5a9ceb11b9934130bbfb9f0b2ce3f9af019f4e0e6711d07447ff,2025-06-13T03:15:52.607000 CVE-2025-5928,0,0,9a32f510da05cddff71ada044b658dc0f190971da9131d5047326ff61f5af886,2025-06-13T03:15:52.767000 @@ -297869,5 +297874,6 @@ CVE-2025-6006,0,0,f3890d678b52a65bb188746bd2b72b04830e80f4fcc6e370b4f5f482a5c894 CVE-2025-6007,0,0,0a6b30e00b610d68c64f9ae664f6748f210976b9ca69a527a02472b830ffa838,2025-06-12T16:06:20.180000 CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f94481,2025-06-12T16:06:20.180000 CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000 +CVE-2025-6012,1,1,85bb11daadd2c9711de1e56ddc8b0e0022d882d1b7428575f169e5e84f349018,2025-06-13T08:15:19.507000 CVE-2025-6021,0,0,d8cb911042c78ed7473b58fa173a0ecc04974b2be82b9747683ed0cea25a5aba,2025-06-12T16:06:20.180000 CVE-2025-6031,0,0,f55877d9a515055d82923e15e107b73e885b2a97ca1430544a245162a02b6450,2025-06-12T20:15:22.450000