From 422e563e60c19615449ef2ae0996cefc51a55a2a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 10 Jun 2025 02:03:58 +0000 Subject: [PATCH] Auto-Update: 2025-06-10T02:00:19.762752+00:00 --- CVE-2023/CVE-2023-400xx/CVE-2023-40000.json | 57 +++++++- CVE-2024/CVE-2024-15xx/CVE-2024-1526.json | 46 ++++++- CVE-2024/CVE-2024-242xx/CVE-2024-24272.json | 34 ++++- CVE-2024/CVE-2024-251xx/CVE-2024-25187.json | 43 +++++- CVE-2024/CVE-2024-273xx/CVE-2024-27309.json | 57 ++++++-- CVE-2024/CVE-2024-284xx/CVE-2024-28458.json | 31 ++++- CVE-2024/CVE-2024-287xx/CVE-2024-28714.json | 69 ++++++++-- CVE-2024/CVE-2024-287xx/CVE-2024-28755.json | 63 +++++++-- CVE-2024/CVE-2024-30xx/CVE-2024-3075.json | 46 ++++++- CVE-2024/CVE-2024-310xx/CVE-2024-31013.json | 35 ++++- CVE-2024/CVE-2024-310xx/CVE-2024-31036.json | 33 ++++- CVE-2024/CVE-2024-310xx/CVE-2024-31040.json | 33 ++++- CVE-2024/CVE-2024-310xx/CVE-2024-31041.json | 33 ++++- CVE-2024/CVE-2024-315xx/CVE-2024-31583.json | 52 +++++-- CVE-2024/CVE-2024-317xx/CVE-2024-31750.json | 45 +++++- CVE-2024/CVE-2024-317xx/CVE-2024-31783.json | 34 ++++- CVE-2024/CVE-2024-317xx/CVE-2024-31784.json | 32 ++++- CVE-2024/CVE-2024-420xx/CVE-2024-42009.json | 6 +- CVE-2025/CVE-2025-00xx/CVE-2025-0036.json | 72 ++++++++++ CVE-2025/CVE-2025-00xx/CVE-2025-0037.json | 56 ++++++++ CVE-2025/CVE-2025-231xx/CVE-2025-23192.json | 60 ++++++++ CVE-2025/CVE-2025-313xx/CVE-2025-31325.json | 60 ++++++++ CVE-2025/CVE-2025-324xx/CVE-2025-32433.json | 6 +- CVE-2025/CVE-2025-429xx/CVE-2025-42977.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42982.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42983.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42984.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42987.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42988.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42989.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42990.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42991.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42993.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42994.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42995.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42996.json | 60 ++++++++ CVE-2025/CVE-2025-429xx/CVE-2025-42998.json | 60 ++++++++ CVE-2025/CVE-2025-43xx/CVE-2025-4318.json | 10 +- CVE-2025/CVE-2025-59xx/CVE-2025-5903.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-59xx/CVE-2025-5904.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-59xx/CVE-2025-5905.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-59xx/CVE-2025-5906.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-59xx/CVE-2025-5907.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-59xx/CVE-2025-5908.json | 145 ++++++++++++++++++++ README.md | 67 ++++++--- _state.csv | 86 +++++++----- 46 files changed, 2733 insertions(+), 143 deletions(-) create mode 100644 CVE-2025/CVE-2025-00xx/CVE-2025-0036.json create mode 100644 CVE-2025/CVE-2025-00xx/CVE-2025-0037.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23192.json create mode 100644 CVE-2025/CVE-2025-313xx/CVE-2025-31325.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42977.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42982.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42983.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42984.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42987.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42988.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42989.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42990.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42991.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42993.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42994.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42995.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42996.json create mode 100644 CVE-2025/CVE-2025-429xx/CVE-2025-42998.json create mode 100644 CVE-2025/CVE-2025-59xx/CVE-2025-5903.json create mode 100644 CVE-2025/CVE-2025-59xx/CVE-2025-5904.json create mode 100644 CVE-2025/CVE-2025-59xx/CVE-2025-5905.json create mode 100644 CVE-2025/CVE-2025-59xx/CVE-2025-5906.json create mode 100644 CVE-2025/CVE-2025-59xx/CVE-2025-5907.json create mode 100644 CVE-2025/CVE-2025-59xx/CVE-2025-5908.json diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40000.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40000.json index 45e616a2b52..c26f5280650 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40000.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40000.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40000", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-16T18:15:10.600", - "lastModified": "2024-11-21T08:18:30.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:12:58.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.7.0.1", + "matchCriteriaId": "967FB0CF-DC74-4455-8237-A277E95FE632" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/rxerium/CVE-2023-40000", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1526.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1526.json index 72e3fba1f36..6dc761fd19e 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1526.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1526.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1526", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-01T05:15:07.797", - "lastModified": "2025-03-20T20:15:30.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T00:50:39.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:devpups:social_pug:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.33.1", + "matchCriteriaId": "7F6BD061-62BC-4D63-AD8E-24615BA18EFA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24272.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24272.json index 73865709ea7..dc34aec270d 100644 --- a/CVE-2024/CVE-2024-242xx/CVE-2024-24272.json +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24272.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24272", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T22:15:10.850", - "lastModified": "2025-03-27T20:15:23.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T00:55:42.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itopvpn:dualsafe_password_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.24", + "matchCriteriaId": "8C299234-0F50-43F6-B46A-4C493BB1D180" + } + ] + } + ] + } + ], "references": [ { "url": "https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json index dac5bedb833..7cf7084d64e 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25187.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25187", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T04:15:12.203", - "lastModified": "2024-11-21T09:00:24.440", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T00:46:34.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xiaocheng-keji:71cms:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E09F8EB1-67B4-40FF-AB07-B5015654935B" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/xiaocheng-keji/71cms/issues/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit" + ] }, { "url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/xiaocheng-keji/71cms/issues/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27309.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27309.json index b5857dd0a0f..102683173a3 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27309.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27309.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27309", "sourceIdentifier": "security@apache.org", "published": "2024-04-12T07:15:08.560", - "lastModified": "2025-02-13T18:17:28.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T00:59:50.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:kafka:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5.0", + "versionEndIncluding": "3.6.1", + "matchCriteriaId": "CA81784F-A227-4DFE-8711-840EB6031279" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/12/3", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/6536rmzyg076lzzdw2xdktvnz163mjpy", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240705-0002/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/12/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/6536rmzyg076lzzdw2xdktvnz163mjpy", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240705-0002/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28458.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28458.json index 42f41c17aa6..27fbbbdf373 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28458.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28458.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28458", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T21:15:08.077", - "lastModified": "2024-11-21T09:06:24.153", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:01:30.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json index f2de8caea92..0b903667a8a 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28714.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28714", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T23:15:46.410", - "lastModified": "2024-11-21T09:06:48.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T00:54:10.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,42 +51,89 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crmeb:crmeb_java:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.4", + "matchCriteriaId": "7B87506E-26F7-4CA1-A01B-16898322A42D" + } + ] + } + ] + } + ], "references": [ { "url": "http://crmebjava.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://gitee.com/ZhongBangKeJi/crmeb_java", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "http://crmebjava.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://gitee.com/ZhongBangKeJi/crmeb_java", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/ssti-in-mblog-351-a-tale-of-a-glorified-rce-cve-2024-28713-28714", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28755.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28755.json index b267d6a804a..ac7483c7b72 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28755.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28755.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28755", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T03:15:10.140", - "lastModified": "2024-11-21T09:06:54.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T00:41:15.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5.0", + "versionEndIncluding": "3.6.0", + "matchCriteriaId": "EB2A3689-7273-4428-841D-54E11694CB71" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/hey3e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://hey3e.github.io", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/hey3e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://hey3e.github.io", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3075.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3075.json index 6e23cd9717c..8da7e218192 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3075.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3075.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3075", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.433", - "lastModified": "2025-03-27T15:15:53.037", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:23:11.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mmilan81:mm-email2image:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.2.5", + "matchCriteriaId": "F850D534-0620-4073-B5C7-B2FCF40B3FE8" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31013.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31013.json index 47a428c1e07..b1506980dca 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31013.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31013", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T04:15:12.907", - "lastModified": "2025-03-17T16:15:21.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T01:04:27.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:2.3.0:*:*:*:pro:*:*:*", + "matchCriteriaId": "D51AF99B-7574-4222-A2A2-C1ECC9BE8E51" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/emlog/emlog/issues/291", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/emlog/emlog/issues/291", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json index f83399ae30a..61c8d0cdeb9 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31036.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31036", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T22:15:07.400", - "lastModified": "2024-11-21T09:12:45.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:30:34.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emqx:nanomq:0.21.7:*:*:*:*:*:*:*", + "matchCriteriaId": "AF5103CA-7146-46E2-9B11-06A455EFA96C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nanomq/nanomq/issues/1722", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/nanomq/nanomq/issues/1722", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json index 34a76c90528..0eb2ea93536 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31040", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.680", - "lastModified": "2024-11-21T09:12:45.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:38:19.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emqx:nanomq:0.21.7:*:*:*:*:*:*:*", + "matchCriteriaId": "AF5103CA-7146-46E2-9B11-06A455EFA96C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nanomq/nanomq/issues/1720", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/nanomq/nanomq/issues/1720", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31041.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31041.json index 04ff73c0e3c..a56d1a5d791 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31041.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31041", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.733", - "lastModified": "2024-11-21T09:12:45.993", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:35:36.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emqx:nanomq:0.21.7:*:*:*:*:*:*:*", + "matchCriteriaId": "AF5103CA-7146-46E2-9B11-06A455EFA96C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nanomq/nanomq/issues/1723", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/nanomq/nanomq/issues/1723", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31583.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31583.json index 186fed056f1..cedde4ad5a8 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31583.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31583", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.950", - "lastModified": "2024-11-21T09:13:43.540", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:33:43.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:pytorch:*:*:*:*:*:python:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "CA1ACB1F-9056-4D41-A8C8-33921420D4C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/interpreter.cpp#L132", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pytorch/pytorch/commit/9c7071b0e324f9fb68ab881283d6b8d388a4bcd2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/interpreter.cpp#L132", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pytorch/pytorch/commit/9c7071b0e324f9fb68ab881283d6b8d388a4bcd2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json index 1c67055abd2..4e86abdf48a 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31750", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T00:15:10.690", - "lastModified": "2024-11-21T09:13:50.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:32:26.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:f-logic:datacube3_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1F73E586-1AD1-4280-B63B-CFB91BD33BF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:f-logic:datacube3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0F1221C-A9CB-4625-AABD-2E4890FA6E93" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lampSEC/semcms/blob/main/datacube3.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit" + ] }, { "url": "https://github.com/lampSEC/semcms/blob/main/datacube3.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31783.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31783.json index 65f17db7525..06e42b5c8f3 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31783.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31783.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31783", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T04:15:09.140", - "lastModified": "2025-03-13T16:15:19.433", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:19:10.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.6.7", + "matchCriteriaId": "EBA5590F-3A15-40CF-AC36-6CBA8C128D19" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0x0fc/TyporaXSS/blob/main/TyporaXSS.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/0x0fc/TyporaXSS/blob/main/TyporaXSS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json index 15fd23b0938..2ebda13cfea 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31784", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T04:15:09.200", - "lastModified": "2024-11-21T09:13:52.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T01:14:55.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.8.10", + "matchCriteriaId": "F8545FD7-B699-47D5-A63C-8E58D663FA00" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0x0fc/TyporaIframe/blob/main/TyporaIframeVuln.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/0x0fc/TyporaIframe/blob/main/TyporaIframeVuln.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42009.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42009.json index 5c5dc54acf9..39f85d7a248 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42009.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42009.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42009", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-05T19:15:38.220", - "lastModified": "2025-03-13T16:15:21.467", + "lastModified": "2025-06-10T01:00:02.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ } ] }, + "cisaExploitAdd": "2025-06-09", + "cisaActionDue": "2025-06-30", + "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "RoundCube Webmail Cross-Site Scripting Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0036.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0036.json new file mode 100644 index 00000000000..57f73656d68 --- /dev/null +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0036.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-0036", + "sourceIdentifier": "psirt@amd.com", + "published": "2025-06-10T00:15:21.197", + "lastModified": "2025-06-10T00:15:21.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In AMD Versal Adaptive SoC devices, the incorrect configuration of the SSS during runtime (post-boot) cryptographic operations could cause data to be incorrectly written to and read from invalid locations as well as returning incorrect cryptographic data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 3.2, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + }, + { + "lang": "en", + "value": "CWE-682" + }, + { + "lang": "en", + "value": "CWE-772" + }, + { + "lang": "en", + "value": "CWE-940" + }, + { + "lang": "en", + "value": "CWE-941" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8011.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0037.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0037.json new file mode 100644 index 00000000000..ee3159af322 --- /dev/null +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0037.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0037", + "sourceIdentifier": "psirt@amd.com", + "published": "2025-06-10T00:15:22.103", + "lastModified": "2025-06-10T00:15:22.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8010.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23192.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23192.json new file mode 100644 index 00000000000..7e97377ff93 --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23192.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23192", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:20.847", + "lastModified": "2025-06-10T01:15:20.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP BusinessObjects Business Intelligence (BI Workspace) allows an unauthenticated attacker to craft and store malicious script within a workspace. When the victim accesses the workspace, the script will execute in their browser enabling the attacker to potentially access sensitive session information, modify or make browser information unavailable. This leads to a high impact on confidentiality and low impact on integrity, availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3560693", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31325.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31325.json new file mode 100644 index 00000000000..768fe3eaae4 --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31325.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-31325", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:21.060", + "lastModified": "2025-06-10T01:15:21.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to a Cross-Site Scripting vulnerability in SAP NetWeaver (ABAP Keyword Documentation), an unauthenticated attacker could inject malicious JavaScript into a web page through an unprotected parameter. When a victim accesses the affected page, the script executes in their browser, providing the attacker limited access to restricted information. The vulnerability does not affect data integrity or availability and operates entirely within the context of the client's browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3590887", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json index 2f8c887ce8f..bb50937e72f 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32433.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32433", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-16T22:15:14.373", - "lastModified": "2025-04-25T23:15:16.993", + "lastModified": "2025-06-10T01:00:02.087", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,10 @@ } ] }, + "cisaExploitAdd": "2025-06-09", + "cisaActionDue": "2025-06-30", + "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability", "weaknesses": [ { "source": "security-advisories@github.com", diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42977.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42977.json new file mode 100644 index 00000000000..52c7fefc447 --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42977.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42977", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:21.220", + "lastModified": "2025-06-10T01:15:21.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP NetWeaver Visual Composer contains a Directory Traversal vulnerability caused by insufficient validation of input paths provided by a high-privileged user. This allows an attacker to read or modify arbitrary files, resulting in a high impact on confidentiality and a low impact on integrity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3610591", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42982.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42982.json new file mode 100644 index 00000000000..909f3a215de --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42982.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42982", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:21.383", + "lastModified": "2025-06-10T01:15:21.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP GRC allows a non-administrative user to access and initiate transaction which could allow them to modify or control the transmitted system credentials. This causes high impact on confidentiality, integrity and availability of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3609271", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42983.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42983.json new file mode 100644 index 00000000000..130bd09db1e --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42983.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42983", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:21.537", + "lastModified": "2025-06-10T01:15:21.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP Business Warehouse and SAP Plug-In Basis allows an authenticated attacker to drop arbitrary SAP database tables, potentially resulting in a loss of data or rendering the system unusable. On successful exploitation, an attacker can completely delete database entries but is not able to read any data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3606484", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42984.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42984.json new file mode 100644 index 00000000000..5db2bc76c2d --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42984.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42984", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:21.703", + "lastModified": "2025-06-10T01:15:21.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP S/4HANA Manage Central Purchase Contract does not perform necessary authorization checks for an authenticated user. Due to this, an attacker could execute the function import on the entity making it inaccessible for unrestricted user. This has low impact on confidentiality and availability of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3441087", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42987.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42987.json new file mode 100644 index 00000000000..51f4d4338e0 --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42987.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42987", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:21.860", + "lastModified": "2025-06-10T01:15:21.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit shared rules of any user by tampering the request parameter. Due to missing authorization check, the attacker can edit rules that should be restricted, compromising the integrity of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3596850", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42988.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42988.json new file mode 100644 index 00000000000..84167e8397b --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42988.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42988", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:22.023", + "lastModified": "2025-06-10T01:15:22.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable the researcher to cause SSRF. It has no impact on integrity and availability of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3585545", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42989.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42989.json new file mode 100644 index 00000000000..b6946fb83b1 --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42989.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42989", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:22.183", + "lastModified": "2025-06-10T01:15:22.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RFC inbound processing\ufffddoes not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation the attacker could critically impact both integrity and availability of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3600840", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42990.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42990.json new file mode 100644 index 00000000000..83d61ea00cf --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42990.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42990", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:22.340", + "lastModified": "2025-06-10T01:15:22.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unprotected SAPUI5 applications allow an attacker with basic privileges to inject malicious HTML code into a webpage, with the goal of redirecting users to the attacker controlled URL. This issue could impact the integrity of the application. Confidentiality or Availability are not impacted." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 3.0, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3601169", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42991.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42991.json new file mode 100644 index 00000000000..979ca3877db --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42991.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42991", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:22.507", + "lastModified": "2025-06-10T01:15:22.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP S/4HANA (Bank Account Application) does not perform necessary authorization checks. This allows an authenticated 'approver' user to delete attachment from bank account application of other user, leading to a low impact on integrity, with no impact on the confidentiality of the data or the availability of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3608058", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42993.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42993.json new file mode 100644 index 00000000000..08fab99055a --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42993.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42993", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:22.667", + "lastModified": "2025-06-10T01:15:22.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the attacker to consume events via the RFC destination, leading to code execution under the privileges of the assigned high-privilege user. While the vulnerability has a low impact on Availability, it significantly poses a high risk to both Confidentiality and Integrity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3580384", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42994.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42994.json new file mode 100644 index 00000000000..86e34f7fc3e --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42994.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42994", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:22.823", + "lastModified": "2025-06-10T01:15:22.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP MDM Server ReadString function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail and exit unexpectedly causing high impact on availability with no impact on confidentiality and integrity of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-590" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3610006", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42995.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42995.json new file mode 100644 index 00000000000..a2574801044 --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42995.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42995", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:22.980", + "lastModified": "2025-06-10T01:15:22.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP MDM Server Read function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail and exit unexpectedly causing high impact on availability with no impact on confidentiality and integrity of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-590" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3610006", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42996.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42996.json new file mode 100644 index 00000000000..50660e2e73b --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42996.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42996", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:23.143", + "lastModified": "2025-06-10T01:15:23.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SAP MDM Server allows an attacker to gain control of existing client sessions and execute certain functions without having to re-authenticate giving the ability to access or modify non-sensitive information or consume sufficient resources which could degrade the performance of the server causing low impact on confidentiality, integrity and availibility of the application." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-590" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3610006", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-429xx/CVE-2025-42998.json b/CVE-2025/CVE-2025-429xx/CVE-2025-42998.json new file mode 100644 index 00000000000..eb9430097aa --- /dev/null +++ b/CVE-2025/CVE-2025-429xx/CVE-2025-42998.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-42998", + "sourceIdentifier": "cna@sap.com", + "published": "2025-06-10T01:15:23.307", + "lastModified": "2025-06-10T01:15:23.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The security settings in the SAP Business One Integration Framework are not adequately checked, allowing attackers to bypass the 403 Forbidden error and access restricted pages. This leads to low impact on confidentiality of the application, there is no impact on integrity and availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@sap.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + } + ], + "references": [ + { + "url": "https://me.sap.com/notes/3594258", + "source": "cna@sap.com" + }, + { + "url": "https://url.sap/sapsecuritypatchday", + "source": "cna@sap.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4318.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4318.json index a84a7a96a5d..debed03dd11 100644 --- a/CVE-2025/CVE-2025-43xx/CVE-2025-4318.json +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4318.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4318", "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "published": "2025-05-05T19:15:57.847", - "lastModified": "2025-05-05T20:54:19.760", + "lastModified": "2025-06-10T01:15:23.483", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -77,6 +77,14 @@ { "url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-010/", "source": "ff89ba41-3aa1-4d27-914a-91399e9639e5" + }, + { + "url": "https://blog.securelayer7.net/cve-2025-4318-aws-amplify-rce/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/aws-amplify/amplify-codegen-ui/security/advisories/GHSA-hf3j-86p7-mfw8", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5903.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5903.json new file mode 100644 index 00000000000..777b1764da8 --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5903.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5903", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-10T00:15:22.243", + "lastModified": "2025-06-10T00:15:22.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiAclRules-20bdf0aa118580399a8df6ba2a44c197", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311676", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311676", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592247", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5904.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5904.json new file mode 100644 index 00000000000..90d3746ab12 --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5904.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5904", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-10T00:15:22.453", + "lastModified": "2025-06-10T00:15:22.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument device_name leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiMeshName-20bdf0aa1185806eb922dbd496c4a4b4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311677", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311677", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592264", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5905.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5905.json new file mode 100644 index 00000000000..d36383295e4 --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5905.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5905", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-10T00:15:22.653", + "lastModified": "2025-06-10T00:15:22.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been rated as critical. Affected by this issue is the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument Password leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiRepeaterCfg-20bdf0aa118580bd8cd0da62d4d2e47f?pvs=73", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311678", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311678", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592265", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5906.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5906.json new file mode 100644 index 00000000000..ec8fafd0b3e --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5906.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5906", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-10T01:15:23.720", + "lastModified": "2025-06-10T01:15:23.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in code-projects Laundry System 1.0. This affects an unknown part of the file /data/. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/tuooo/CVE/issues/11", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311679", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311679", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592266", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5907.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5907.json new file mode 100644 index 00000000000..5d6272a3d76 --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5907.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5907", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-10T01:15:23.963", + "lastModified": "2025-06-10T01:15:23.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This vulnerability affects unknown code of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/byxs0x0/cve2/blob/main/3.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311680", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311680", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592267", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5908.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5908.json new file mode 100644 index 00000000000..6edc5a647b7 --- /dev/null +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5908.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5908", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-10T01:15:24.167", + "lastModified": "2025-06-10T01:15:24.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/byxs0x0/cve2/blob/main/4.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311681", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311681", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.592269", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 4f1198a5b8a..10f2e804899 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-09T23:55:19.720674+00:00 +2025-06-10T02:00:19.762752+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-09T23:15:22.617000+00:00 +2025-06-10T01:38:19.090000+00:00 ``` ### Last Data Feed Release @@ -27,36 +27,69 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-06-09T00:00:04.329312+00:00 +2025-06-10T00:00:04.330516+00:00 ``` ### Total Number of included CVEs ```plain -297187 +297211 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `24` -- [CVE-2025-26468](CVE-2025/CVE-2025-264xx/CVE-2025-26468.json) (`2025-06-09T23:15:21.753`) -- [CVE-2025-30183](CVE-2025/CVE-2025-301xx/CVE-2025-30183.json) (`2025-06-09T23:15:21.947`) -- [CVE-2025-30184](CVE-2025/CVE-2025-301xx/CVE-2025-30184.json) (`2025-06-09T22:15:21.440`) -- [CVE-2025-30507](CVE-2025/CVE-2025-305xx/CVE-2025-30507.json) (`2025-06-09T23:15:22.110`) -- [CVE-2025-30515](CVE-2025/CVE-2025-305xx/CVE-2025-30515.json) (`2025-06-09T23:15:22.273`) -- [CVE-2025-49140](CVE-2025/CVE-2025-491xx/CVE-2025-49140.json) (`2025-06-09T22:15:22.153`) -- [CVE-2025-5898](CVE-2025/CVE-2025-58xx/CVE-2025-5898.json) (`2025-06-09T22:15:22.327`) -- [CVE-2025-5899](CVE-2025/CVE-2025-58xx/CVE-2025-5899.json) (`2025-06-09T22:15:22.557`) -- [CVE-2025-5900](CVE-2025/CVE-2025-59xx/CVE-2025-5900.json) (`2025-06-09T22:15:22.790`) -- [CVE-2025-5901](CVE-2025/CVE-2025-59xx/CVE-2025-5901.json) (`2025-06-09T23:15:22.433`) -- [CVE-2025-5902](CVE-2025/CVE-2025-59xx/CVE-2025-5902.json) (`2025-06-09T23:15:22.617`) +- [CVE-2025-0036](CVE-2025/CVE-2025-00xx/CVE-2025-0036.json) (`2025-06-10T00:15:21.197`) +- [CVE-2025-0037](CVE-2025/CVE-2025-00xx/CVE-2025-0037.json) (`2025-06-10T00:15:22.103`) +- [CVE-2025-23192](CVE-2025/CVE-2025-231xx/CVE-2025-23192.json) (`2025-06-10T01:15:20.847`) +- [CVE-2025-31325](CVE-2025/CVE-2025-313xx/CVE-2025-31325.json) (`2025-06-10T01:15:21.060`) +- [CVE-2025-42977](CVE-2025/CVE-2025-429xx/CVE-2025-42977.json) (`2025-06-10T01:15:21.220`) +- [CVE-2025-42982](CVE-2025/CVE-2025-429xx/CVE-2025-42982.json) (`2025-06-10T01:15:21.383`) +- [CVE-2025-42983](CVE-2025/CVE-2025-429xx/CVE-2025-42983.json) (`2025-06-10T01:15:21.537`) +- [CVE-2025-42984](CVE-2025/CVE-2025-429xx/CVE-2025-42984.json) (`2025-06-10T01:15:21.703`) +- [CVE-2025-42987](CVE-2025/CVE-2025-429xx/CVE-2025-42987.json) (`2025-06-10T01:15:21.860`) +- [CVE-2025-42988](CVE-2025/CVE-2025-429xx/CVE-2025-42988.json) (`2025-06-10T01:15:22.023`) +- [CVE-2025-42989](CVE-2025/CVE-2025-429xx/CVE-2025-42989.json) (`2025-06-10T01:15:22.183`) +- [CVE-2025-42990](CVE-2025/CVE-2025-429xx/CVE-2025-42990.json) (`2025-06-10T01:15:22.340`) +- [CVE-2025-42991](CVE-2025/CVE-2025-429xx/CVE-2025-42991.json) (`2025-06-10T01:15:22.507`) +- [CVE-2025-42993](CVE-2025/CVE-2025-429xx/CVE-2025-42993.json) (`2025-06-10T01:15:22.667`) +- [CVE-2025-42994](CVE-2025/CVE-2025-429xx/CVE-2025-42994.json) (`2025-06-10T01:15:22.823`) +- [CVE-2025-42995](CVE-2025/CVE-2025-429xx/CVE-2025-42995.json) (`2025-06-10T01:15:22.980`) +- [CVE-2025-42996](CVE-2025/CVE-2025-429xx/CVE-2025-42996.json) (`2025-06-10T01:15:23.143`) +- [CVE-2025-42998](CVE-2025/CVE-2025-429xx/CVE-2025-42998.json) (`2025-06-10T01:15:23.307`) +- [CVE-2025-5903](CVE-2025/CVE-2025-59xx/CVE-2025-5903.json) (`2025-06-10T00:15:22.243`) +- [CVE-2025-5904](CVE-2025/CVE-2025-59xx/CVE-2025-5904.json) (`2025-06-10T00:15:22.453`) +- [CVE-2025-5905](CVE-2025/CVE-2025-59xx/CVE-2025-5905.json) (`2025-06-10T00:15:22.653`) +- [CVE-2025-5906](CVE-2025/CVE-2025-59xx/CVE-2025-5906.json) (`2025-06-10T01:15:23.720`) +- [CVE-2025-5907](CVE-2025/CVE-2025-59xx/CVE-2025-5907.json) (`2025-06-10T01:15:23.963`) +- [CVE-2025-5908](CVE-2025/CVE-2025-59xx/CVE-2025-5908.json) (`2025-06-10T01:15:24.167`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `20` +- [CVE-2023-40000](CVE-2023/CVE-2023-400xx/CVE-2023-40000.json) (`2025-06-10T01:12:58.563`) +- [CVE-2024-1526](CVE-2024/CVE-2024-15xx/CVE-2024-1526.json) (`2025-06-10T00:50:39.620`) +- [CVE-2024-24272](CVE-2024/CVE-2024-242xx/CVE-2024-24272.json) (`2025-06-10T00:55:42.550`) +- [CVE-2024-25187](CVE-2024/CVE-2024-251xx/CVE-2024-25187.json) (`2025-06-10T00:46:34.737`) +- [CVE-2024-27309](CVE-2024/CVE-2024-273xx/CVE-2024-27309.json) (`2025-06-10T00:59:50.953`) +- [CVE-2024-28458](CVE-2024/CVE-2024-284xx/CVE-2024-28458.json) (`2025-06-10T01:01:30.743`) +- [CVE-2024-28714](CVE-2024/CVE-2024-287xx/CVE-2024-28714.json) (`2025-06-10T00:54:10.907`) +- [CVE-2024-28755](CVE-2024/CVE-2024-287xx/CVE-2024-28755.json) (`2025-06-10T00:41:15.783`) +- [CVE-2024-3075](CVE-2024/CVE-2024-30xx/CVE-2024-3075.json) (`2025-06-10T01:23:11.353`) +- [CVE-2024-31013](CVE-2024/CVE-2024-310xx/CVE-2024-31013.json) (`2025-06-10T01:04:27.800`) +- [CVE-2024-31036](CVE-2024/CVE-2024-310xx/CVE-2024-31036.json) (`2025-06-10T01:30:34.650`) +- [CVE-2024-31040](CVE-2024/CVE-2024-310xx/CVE-2024-31040.json) (`2025-06-10T01:38:19.090`) +- [CVE-2024-31041](CVE-2024/CVE-2024-310xx/CVE-2024-31041.json) (`2025-06-10T01:35:36.873`) +- [CVE-2024-31583](CVE-2024/CVE-2024-315xx/CVE-2024-31583.json) (`2025-06-10T01:33:43.180`) +- [CVE-2024-31750](CVE-2024/CVE-2024-317xx/CVE-2024-31750.json) (`2025-06-10T01:32:26.340`) +- [CVE-2024-31783](CVE-2024/CVE-2024-317xx/CVE-2024-31783.json) (`2025-06-10T01:19:10.013`) +- [CVE-2024-31784](CVE-2024/CVE-2024-317xx/CVE-2024-31784.json) (`2025-06-10T01:14:55.257`) +- [CVE-2024-42009](CVE-2024/CVE-2024-420xx/CVE-2024-42009.json) (`2025-06-10T01:00:02.087`) +- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-06-10T01:00:02.087`) +- [CVE-2025-4318](CVE-2025/CVE-2025-43xx/CVE-2025-4318.json) (`2025-06-10T01:15:23.483`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5b8e920c54f..4e1766b75d1 100644 --- a/_state.csv +++ b/_state.csv @@ -232396,7 +232396,7 @@ CVE-2023-39997,0,0,30a8b687bafab2083717c9daa4e43951f503741e66f546539c9f352ad4028 CVE-2023-39998,0,0,0aa1d87c7d15430aef5a56459adb004cd2be2550e9c553acb348a55d9d82b230,2025-01-31T14:22:08.727000 CVE-2023-39999,0,0,82b82212a0025fead4708054dd0afb247ed047894644e263dcde31faebf34331,2024-11-21T08:16:12.447000 CVE-2023-4000,0,0,39f91b713d4713b662aa8e3a2c23ad21a9a5b27c7f23cc18f70c42a560e4fe8b,2024-11-21T08:34:11.757000 -CVE-2023-40000,0,0,2a1407722093a90e37ba5ec6b10ea074764f0585dc804d9b9fdab1824bce8663,2024-11-21T08:18:30.070000 +CVE-2023-40000,0,1,b81f93c983b29fe639d04eed06fc4b450a11146b99040fc3073612832cae32cc,2025-06-10T01:12:58.563000 CVE-2023-40001,0,0,ccafe70163175ef0d8ce148a91e88d6b5fe2ed58d2617d4261cdcfaf2715f565,2024-12-13T15:15:20.870000 CVE-2023-40002,0,0,d628bd72e8db6227f7563b4fdade129622158c80a90b6ea31c7755104d7bc549,2024-11-21T08:18:30.170000 CVE-2023-40003,0,0,32013fef05f2fe1c148479ccd00a1acdff49d760fc8d6affd3a7ed938f7dd491,2025-02-05T14:28:12.657000 @@ -249270,7 +249270,7 @@ CVE-2024-1521,0,0,b9e9b7158ea19eb6e0d034a7fbba1cb55281ba560e9c40fc45dc77953ecba6 CVE-2024-1522,0,0,9cdb2d31b60237752ef77325c4d109881b58042aa66e5c8934108a236d1a4daf,2024-11-21T08:50:45.060000 CVE-2024-1523,0,0,048eef54d080ea57df02f8070dee964acb62eadaded82c061ede59f9519607a2,2025-01-23T19:55:29.380000 CVE-2024-1525,0,0,c5719c2d073faeda894e23a5762be2b220de3339124866e59d0ff45c5692c966,2024-11-21T08:50:45.333000 -CVE-2024-1526,0,0,071ecf3918efe80edacfbe601879f9356c96a5266b79b784b3049ab010075d7a,2025-03-20T20:15:30.910000 +CVE-2024-1526,0,1,9925e60bac646ba4db690071c0513797a375618197f29bf844fbe3f8e94539be,2025-06-10T00:50:39.620000 CVE-2024-1527,0,0,5751429710d32c75a60ec4a9e982330410d061acf3fb1dcc13b89e3ee102fa3f,2025-02-26T15:38:35.823000 CVE-2024-1528,0,0,f5fe7b2e6cfb357311ef59f2fa0ff32060f0bc6e50e568e1590dc784a7e328e5,2025-02-26T15:38:21.990000 CVE-2024-1529,0,0,e8bd623b4687f1fd281f2be84741e4de6fae302bf8f504711970b39f10ae43a3,2025-02-26T15:18:02.950000 @@ -253193,7 +253193,7 @@ CVE-2024-24265,0,0,6e9c18a10ed665d0971c17b8d66c12683e1c03339bff964445be562bd85c0 CVE-2024-24266,0,0,af02336efcfa0543c3e97f34d9dba916b482a01f48e05fd35bbfc898afb8622c,2025-06-05T19:15:27.480000 CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000 CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000 -CVE-2024-24272,0,0,46ae69797319549d9edf794666b290a4d67db636dbf7faad557e08964c373ef7,2025-03-27T20:15:23.717000 +CVE-2024-24272,0,1,c37469fadd1b04217b435dbc25f6292c671c3f3072f4f460970d1ceb54198e6d,2025-06-10T00:55:42.550000 CVE-2024-24275,0,0,3c8aa5e14da0cb646977d6dea2bbdcc1e8a016977bac5e3f5c10f87d01f6c88e,2025-03-27T21:15:45.937000 CVE-2024-24276,0,0,7bffcccdaa3ffe4fc240b27bb8a64ead8af378a61a210ff0bd0560962909da4b,2025-03-27T21:15:46.123000 CVE-2024-24278,0,0,3cbad9839e249836fd2db6ae47deedb03afcdc79c37d76090948905d5a88401f,2025-05-23T14:45:05.690000 @@ -253843,7 +253843,7 @@ CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f0 CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000 CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000 CVE-2024-25180,0,0,6c4f9519ece96564cb8bbb38c56337d15b68729b9ea597b77e43cb8c48c7e78f,2025-05-13T14:46:15.803000 -CVE-2024-25187,0,0,dc84ac70b7a834ca4d8817cfba89f5533dd0ade82e09a3247aa14cb146afc867,2024-11-21T09:00:24.440000 +CVE-2024-25187,0,1,b5bdcba71ceb1efd4b7f3a75dfc46c9a93b6aa6414ead7bfb505e326018a4574,2025-06-10T00:46:34.737000 CVE-2024-25189,0,0,509ea081e277357b278ee949dac27256cde1e5cd64a689b5f46c4a4823913802,2024-11-21T09:00:24.657000 CVE-2024-2519,0,0,25506805cec23f34da1bcf6347cfcf15afa6fdde406c956fdefd44554556e9ce,2025-02-14T16:59:14.683000 CVE-2024-25190,0,0,b1ba4d33a756c63f1888b43396a47998407e09c652481bc438cf266fbee6871e,2024-11-21T09:00:24.893000 @@ -255593,7 +255593,7 @@ CVE-2024-27305,0,0,e12f3c61dd0cffc99acfa36652f57b0b6eeecc0c2f6472e94e57f7ef61b87 CVE-2024-27306,0,0,7a28ab142666bcaf42530dd089da65a8aca11e816370cd89a9870260ca5d05b6,2024-11-21T09:04:17.527000 CVE-2024-27307,0,0,cf618de8ec42069f47b1c5022714176e378177129a4fe94cef62bc4f79ac235a,2024-11-21T09:04:17.667000 CVE-2024-27308,0,0,37f214bdd3eae19c6ca746aa11f3f3b092a842a3922749c87981b4f4a93b4ee5,2024-11-21T09:04:17.800000 -CVE-2024-27309,0,0,570c97a789fd13ad0b10fc55182811a30969fc7ac7f41d6a0269deb68c312af1,2025-02-13T18:17:28.160000 +CVE-2024-27309,0,1,6271d6ec0914264bb86483a74a4b3fdc9c4d92f0fc76e869075fe05585b0fa0c,2025-06-10T00:59:50.953000 CVE-2024-2731,0,0,f36a4a3bfea742e45f44c0d5df175483b69ed20da7cae25a4955506b87b8aba4,2024-11-21T09:10:23.687000 CVE-2024-27310,0,0,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000 CVE-2024-27311,0,0,0c755bcc622ed9c321ec0b34f3a1b0b3952780668adba0a01799036912b6aff4,2024-11-21T09:04:18.287000 @@ -256452,7 +256452,7 @@ CVE-2024-28446,0,0,130fe6f11acb7921804657dac29074c2a724a37c0f7026ddccf60719c6661 CVE-2024-28447,0,0,96f74453ed1c3ab881a5353933e4fe8cdaefba2a1eb3251d1371e6f2bfd54cd7,2024-11-21T09:06:23.603000 CVE-2024-2845,0,0,80105c9d9b479536e543f6f21c5940bb1e70afb1eb269649ceef66615a154207,2024-11-21T09:10:39.807000 CVE-2024-28456,0,0,ad91c18de021a8979ada1ac9be6d1ef0a012ed4dac545d0eff1ea9a48f1067db,2025-03-27T20:15:25.390000 -CVE-2024-28458,0,0,f0a88bd4e0af743dcf93dc794cdbbff9507aa57dc92b0582648ff8a3cda4c2d2,2024-11-21T09:06:24.153000 +CVE-2024-28458,0,1,d089e0961a07e124018e8d1f556d32c3ead9fdaff86fbfb737b29b7b2926cfd5,2025-06-10T01:01:30.743000 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 CVE-2024-2847,0,0,071016739328742b92b352de5364c32b24bf8902a38c2e6f36bcce22b371719e,2025-03-24T13:28:51.537000 CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000 @@ -256553,7 +256553,7 @@ CVE-2024-28709,0,0,e561d43db0fcfedfba49cc4e0ad9b7df245718849f34cf15c2746fbbbd304 CVE-2024-2871,0,0,00a3f70b188d4cab7c8441ec548194239184a6bf2caa9d2c154a343ad4f6f55d,2025-02-07T19:34:58.843000 CVE-2024-28710,0,0,7ad2d331f1ff2a6c136748841c0166b43d4373b2229d7792bca3a0fa8b058dce,2025-03-25T17:15:53.377000 CVE-2024-28713,0,0,2660345ba02ff88ce3f8082cd6d8b2d36e81d83381b6e06b251f4d9ba4804eb1,2024-11-21T09:06:48.013000 -CVE-2024-28714,0,0,457ce115a45e3373db362f2c5cad735326647eda50a6c6a00a6972e9dd495beb,2024-11-21T09:06:48.243000 +CVE-2024-28714,0,1,2016e8accbb7084f74d0c24ce4b81c6735174694ae204335fd0b22c9533ecf84,2025-06-10T00:54:10.907000 CVE-2024-28715,0,0,d9472ea6a43c015dd517a111759ac118e36738fa957d5cf07fc0beb9d6a287d7,2024-11-21T09:06:48.480000 CVE-2024-28716,0,0,3dcaba8e53d55236594341cc0c05e3a01de74966176d9fe2a191736842553636,2024-11-21T09:06:48.700000 CVE-2024-28717,0,0,f064c2527027f1d200a3ae2380ea6a1de60fc691a685db676c60e122a78221c4,2024-11-21T09:06:48.930000 @@ -256587,7 +256587,7 @@ CVE-2024-28751,0,0,ceaed3272b135a4722d7745acb0bc62f516b0fe247956e66de3108e0ddf15 CVE-2024-28752,0,0,3743867d820cb3fac6cc93d0ae0ebb1af1934f8628bb7b6539e88268ce65acb8,2025-02-13T18:17:48.857000 CVE-2024-28753,0,0,bf7e9c161fe17ddef885af4de9deb82e14e1947648f4df3c13214108525d2ba1,2025-05-01T00:17:11.497000 CVE-2024-28754,0,0,2214144a78c46b2580bfbfec179b899b282fb753a98595a9fdf69833f99d7b2c,2025-05-01T00:13:29.087000 -CVE-2024-28755,0,0,163c8c2cf8da1f76adb3923ec4d582428a1d613293b4d594d252564f3eeef50a,2024-11-21T09:06:54.030000 +CVE-2024-28755,0,1,94db876d89381c6bafbe99b1b5cd635119fcf3d8444f7aa68a6413cada173fe6,2025-06-10T00:41:15.783000 CVE-2024-28756,0,0,690c3487a07876dd049c19665e845da2f28dadbd04cc6a33595a62792634596a,2024-11-21T09:06:54.270000 CVE-2024-28757,0,0,81da43f42617b41a14b128c7de9bea07265204ff81eb0bea8f4158090d852760,2025-03-28T19:15:21.230000 CVE-2024-28759,0,0,0a4255815bf43753569b9bf94f2fbddf12d43389c8cf8017f7885f21185e8276,2025-03-28T20:15:21.890000 @@ -258203,7 +258203,7 @@ CVE-2024-30735,0,0,753441d7803dcc475ebaf2cfa2a11fe542629a9d58de825feb7b68625b124 CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015abda,2024-05-27T01:15:20.203000 CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000 CVE-2024-3074,0,0,3994c2cc8b929115537999419e9e3fcc4366d9ad5b592787d0ddf7bba23509f6,2024-11-21T09:28:50.367000 -CVE-2024-3075,0,0,bcefb8f1520e4ccbad4feaa2ef3504905e1eb621afb9483e15b0eb03a2e859c6,2025-03-27T15:15:53.037000 +CVE-2024-3075,0,1,79e774c47eb18851562c97832d067dddf9a748a04470426bc1a3785e01ac544e,2025-06-10T01:23:11.353000 CVE-2024-3076,0,0,b1bccbf63a16fe85396c421bd8338b5453b7e47b5e19a26088ca344942b34be7,2024-11-21T09:28:50.613000 CVE-2024-3077,0,0,fcbdd34b10368896e2c3c22301b222fc061a71cd9d47f461bb0e75567c8c2976,2025-01-23T19:21:44.207000 CVE-2024-3078,0,0,f23febdf123fb1167e6d15c44d9f90ae5c695a87735eb2afb067ff82e8b10873,2025-05-07T16:29:10.603000 @@ -258323,7 +258323,7 @@ CVE-2024-3101,0,0,b43a9a65b8dd96b574d88a97c97263dded7de7cc0c3f0a55bcbdc8a92c066a CVE-2024-31010,0,0,0b7313de80070fac2f916c379350f99d1722550266fcd7ba61df1f5dcf1681fd,2025-04-04T16:31:46.253000 CVE-2024-31011,0,0,24b6b4b4d911bb44d7c9f667d95c31c2327e63da8572762d344d3e3e7da6b6a9,2024-11-21T09:12:43.390000 CVE-2024-31012,0,0,d5ae84c7329c4f393c728c5d6d85bb69767e6e8081880813cb0948691be7d260,2025-04-04T15:50:24.237000 -CVE-2024-31013,0,0,01d61c602b8e92c3361daf4356e39b3ab9f29a666d0e5bc89ee8873e6fa392ba,2025-03-17T16:15:21.610000 +CVE-2024-31013,0,1,c8b08beaa05aa5eafe964510521b6e1a3b6ffa974e1c46ebca30a5ea5eebf3ef,2025-06-10T01:04:27.800000 CVE-2024-3102,0,0,21789bb35ca485f7acde593041e201a50941c14df197110842a770f0c2af0902,2024-11-21T09:28:54.413000 CVE-2024-31022,0,0,fa5cfa9d6c969311b3ca6b9628703584da75e1c91aae7ef142d5c75f0c054419,2025-05-22T14:28:25.127000 CVE-2024-31025,0,0,65d7ab3959086e03b6d319a4283b4c427986c994cd6832b660245eeb10de9b88,2024-11-21T09:12:44.277000 @@ -258333,10 +258333,10 @@ CVE-2024-31030,0,0,2db6cd87c60f7cba647aba4826c76d42ed0417061d17f5a5018404da807f4 CVE-2024-31031,0,0,a40df481a620a7d230484f07ff93a7a4fe0711a2410e3138fc89f889af0f1188,2024-11-21T09:12:44.903000 CVE-2024-31032,0,0,e702405228d09553ece2bdc0352b8b45095427e9fa8e7955f679e55af20e2fcd,2024-11-21T09:12:45.123000 CVE-2024-31033,0,0,0c9876f1f7699edaaf20bd486b2d0f4a44b9fca47defdf69e7e92d25a918fefb,2024-11-21T09:12:45.350000 -CVE-2024-31036,0,0,320a51acab827b5d37020b83564dfffd9aca98638cefa3812e1bd2ea9696700a,2024-11-21T09:12:45.570000 +CVE-2024-31036,0,1,9db90a521957d495bc1ad6aad2637c8bbbfa08dc186eb4535e399179e99c009d,2025-06-10T01:30:34.650000 CVE-2024-3104,0,0,9bfd1c8aa5b4e014e62890c50cd4cea704588702c7ca86175d35f3b244f64537,2024-11-21T09:28:54.563000 -CVE-2024-31040,0,0,6ba23bdacaedfa612d50a99761a699fec9ed7d54aeccae1ec2a3d9166ef093d8,2024-11-21T09:12:45.783000 -CVE-2024-31041,0,0,b75059e0a7695edaebc103078218ee6b58e5dbb076a591dc445c471bb0852293,2024-11-21T09:12:45.993000 +CVE-2024-31040,0,1,1a2c235a6f44cc46eddf090afea207111fd019edd2f8ef967cabb72b2615c80e,2025-06-10T01:38:19.090000 +CVE-2024-31041,0,1,4ffaeb2517870e7822b55fdc3ec9c5343447ff1d513d0eca0aa6d5b854f90a9e,2025-06-10T01:35:36.873000 CVE-2024-31047,0,0,72dbb8970f9822abc0ce34482f5428d56b2ed11de070e20d26d991147ce9c9fe,2024-11-21T09:12:46.207000 CVE-2024-3105,0,0,84feae1bbc69233e3efa769dd357754a7d54983a559abad6a239194aa6dbc066,2024-11-21T09:28:54.717000 CVE-2024-31061,0,0,8b79c6b582e94a5772b403ef365a2568a08e1a521fb33c0f0446400b2cd799d3,2025-04-03T15:09:53.590000 @@ -258814,7 +258814,7 @@ CVE-2024-3158,0,0,64ba1d8f16765085f53ed9bc04ebfd9e3747ac661f2c36e1e05c9b39e1f126 CVE-2024-31580,0,0,edde7918add3c016a5d1a89364b3c85df232b957b4de682b61bed612a4074f41,2025-03-29T00:15:21.733000 CVE-2024-31581,0,0,26f0b24afcce49599eab006e4dd0f04d587c422933e6a771f6252572dbc45bb1,2025-06-03T15:30:44.147000 CVE-2024-31582,0,0,99d23ed94eadae550f3d5e4c7af4b99a2ab1c155adf84f6b0b2f2ac44026309e,2025-06-03T15:42:14.187000 -CVE-2024-31583,0,0,f1ca2f57a4fb9ac891f614bcec1b1782e644a75286acabe19e0169b0f358659a,2024-11-21T09:13:43.540000 +CVE-2024-31583,0,1,1d576dd3b933c7522919c517b06d1ad1b517de1d12fdfb1240e571027186192e,2025-06-10T01:33:43.180000 CVE-2024-31584,0,0,420fc644c705856ba8dd98ddb90300aaa523243bcaf8db7ce5ea0fd2d33809c9,2025-06-03T14:04:04.327000 CVE-2024-31585,0,0,c3b782f97e2c9184cdf5a1bdf306b5395c037aafeff6c2ffaeb4ab22a9db35e6,2025-06-09T16:15:34.637000 CVE-2024-31586,0,0,5efc79e21fbd8ed4e63282b64efbd5820d7cef26890f5053c7ad3f1ac2b5e4c1,2025-04-11T15:15:56.880000 @@ -258879,7 +258879,7 @@ CVE-2024-31744,0,0,83351da41e2f0f78c478d134c6a6a32ac303a7f74c88c74911c725e1530b5 CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7eb7c,2024-04-25T16:15:11.227000 CVE-2024-31747,0,0,1ff83f224bdbf8af1f9f4bcb86a91e1f678c13094ae1a77fdf1fd657baea901e,2024-11-21T09:13:50.523000 CVE-2024-3175,0,0,5f6302a6462e73c7261678b54271c3937e1258b7b4f3007957ea22e83fdb94e8,2024-11-21T09:29:04.757000 -CVE-2024-31750,0,0,ebc9cb1e3513b20141faf6cc056c1c0b45ffe30f8c3ff897fd2fe4195d0a3bf7,2024-11-21T09:13:50.730000 +CVE-2024-31750,0,1,f96eb8e3bbed78e55e09766d655b63a754ae5a7049972e728e16ce77deb482bc,2025-06-10T01:32:26.340000 CVE-2024-31755,0,0,71bb3aeb22181c517b85e9c0b60741c7bd35507479d56fe5a7b173dda191453a,2024-11-21T09:13:50.943000 CVE-2024-31756,0,0,0934d41af4d2a8096bf6b79ceb165d1d21a8cb15b32982d5c5355673185c396f,2024-11-21T09:13:51.160000 CVE-2024-31757,0,0,827ecdaa9dc7f88a37dfd8f4c09903a5f5a9992b64bc40c5e964ac858799f717,2024-11-21T09:13:51.390000 @@ -258890,8 +258890,8 @@ CVE-2024-3177,0,0,5bf72b0bc06971896d316946ec2a45f35a4b8a5d69e19bb6025aca04738c4b CVE-2024-31771,0,0,8e057a4c7ee5341cf741c545c5de0c42c8357074d8177829bdceb15ae04f34a8,2024-11-21T09:13:52.057000 CVE-2024-31777,0,0,7d39a926878da060c40fa51d8497d0b8588d217d8e3fe5862751b007c9080250,2024-11-21T09:13:52.283000 CVE-2024-3178,0,0,bd9ccb3de86d5f400ed0d1b42c5f29b2c8a2c83bff134722290e4e42bbb62188,2024-12-16T19:02:56.037000 -CVE-2024-31783,0,0,1b8c49320678c1ccd1d27d607e7632b0acf98370bc4a8f789eb554104969f2b5,2025-03-13T16:15:19.433000 -CVE-2024-31784,0,0,f1392842505b72c301eab8b24988106d79c5016d7e81170b70b5cc6eabe4391c,2024-11-21T09:13:52.640000 +CVE-2024-31783,0,1,cf26cbb6b5e47baaf1a5dc46c2b12fd2babed7275c9e954d0a96d1ac4a82c21b,2025-06-10T01:19:10.013000 +CVE-2024-31784,0,1,3a7a609ab5690a1c92f3502af1739158ff2ab69d349be0135b9c2c854a639233,2025-06-10T01:14:55.257000 CVE-2024-3179,0,0,9a56868d90ea74197493de115b9ccc37e34e21c0dcd5e812b7cdcf499135cd56,2024-12-16T19:03:45.313000 CVE-2024-31798,0,0,6c775446367d3139431a8bed0f06dd67790f81a1b7aff5c3c1630353cd491833,2024-08-16T13:59:00.523000 CVE-2024-31799,0,0,f21a03b695d6a36e6ba51b291aa1aa934c4d6926891338e496632c5eaf8bf345,2024-08-16T18:35:10.927000 @@ -266843,7 +266843,7 @@ CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447 CVE-2024-42006,0,0,757a5058e2b20a07332e18e1715746958f2fc29b54fe8104fb4e99ba507aa82a,2025-03-18T20:15:23.103000 CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000 CVE-2024-42008,0,0,de59590c5b8ea2dcb20a78d933da654dd773353d185cc7aa221b80b9d6c81d30,2025-03-13T16:15:21.240000 -CVE-2024-42009,0,0,5077fcd4de8bde6c882fe8ba9cf1a676a407121133b47066804fdf951a128533,2025-03-13T16:15:21.467000 +CVE-2024-42009,0,1,02c0fe508080971857c7db434c0f0da2e38c91601d9214f3de7a413be892a884,2025-06-10T01:00:02.087000 CVE-2024-4201,0,0,caa8de420bccc88e064fd619fe08f6837c80c46ab6ceb4db233139f54456b674,2024-11-21T09:42:22.800000 CVE-2024-42010,0,0,03e7dee0af7871a1319da5b152346d87a38864f6270cfec745878dfc136b3e64,2024-08-12T14:15:07.370000 CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88aca,2024-10-30T18:35:10.283000 @@ -282405,6 +282405,8 @@ CVE-2025-0014,0,0,a85170c840192d156f38eccc61ca038d577c819700d88e03a6460a0a1d9fd8 CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000 CVE-2025-0020,0,0,8efc8d475c4f7672b1cd3ece81996c8d2a7ea8db9fd912e796980b06afe174f9,2025-05-19T19:15:47.690000 CVE-2025-0035,0,0,68fbfea31f364a9172515b704cdb26d45ebc6cad2856985d3329218ae77b3cf5,2025-05-13T19:35:18.080000 +CVE-2025-0036,1,1,4622d895242474524300bf29581e972fd6b88949fc94bc4781252a482e371217,2025-06-10T00:15:21.197000 +CVE-2025-0037,1,1,cc1dfde006ade30b52c8384bda8e2e9f8b9a5502ce2fb01803c3f24f8c09eb35,2025-06-10T00:15:22.103000 CVE-2025-0049,0,0,8566ff09b2bbb295e6a6510741945c10bdac42655494cd307530daa390a46ab3,2025-05-10T00:55:19.180000 CVE-2025-0050,0,0,482b5ff7576183287db2c32c74da0d2abbf92554144e005c1fef00f71efefdf1,2025-04-08T19:15:46.877000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 @@ -286350,6 +286352,7 @@ CVE-2025-23189,0,0,b372693675c5d6d50e215d8acb54007642608e3ca2a789b9ea116e268e1e2 CVE-2025-2319,0,0,250004f4f8ff7b8a3f1cf022fb649f67811f3943071000b1555d7ca7d27e7b29,2025-03-27T16:45:46.410000 CVE-2025-23190,0,0,87842373d301ca780cfdfed4b8137d271e812becd8d75ff110dd7b27091c3193,2025-02-11T01:15:10.413000 CVE-2025-23191,0,0,93bf39b052d32c7fd79bf315d4657bdb3b25800f484d8ee22918be2670f1ecea,2025-02-11T01:15:10.557000 +CVE-2025-23192,1,1,48d1b3601799661a56ff8df20758502b2a832d87787b19305df14e4827422544,2025-06-10T01:15:20.847000 CVE-2025-23193,0,0,dd2b7306807ec40f9912fb49ee68934fd2efddf05fc31efb201a5ebd32befe04,2025-02-11T01:15:10.700000 CVE-2025-23194,0,0,2abdaa039bd60248a2d82f5999a9ed81ae8b9d9f0da1d221293e79525f619c35,2025-03-11T01:15:34.630000 CVE-2025-23195,0,0,f18609b9fc2e63f3f6cc26e297ac4523abaa4c7810065fbb0fe1b0f95fc74e97,2025-06-09T19:36:09.710000 @@ -288636,7 +288639,7 @@ CVE-2025-2645,0,0,bb51f6ba23884b7e7c3767dcbb7ecf7badccba1b056823008f0ccc4a1f7f8f CVE-2025-2646,0,0,1f43af586340e9a3b657344aff21032473ef2c407815ff224af302b07a3268d0,2025-04-02T12:32:58.283000 CVE-2025-26465,0,0,ac0fdb720eaae016b7a47bcdeea42f0bc1abfe57712ef9fedbef53f01af96ede,2025-06-02T15:15:33.437000 CVE-2025-26466,0,0,1656a292c9a746d1d9c8576626629bb24a094bd9c889c8b628a2189f999ed909,2025-05-27T16:15:31.100000 -CVE-2025-26468,1,1,163e88e66617a1b6bce0df5f891a40b8ea6ed555fd047a72d2856f022ca7328b,2025-06-09T23:15:21.753000 +CVE-2025-26468,0,0,163e88e66617a1b6bce0df5f891a40b8ea6ed555fd047a72d2856f022ca7328b,2025-06-09T23:15:21.753000 CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000 CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000 CVE-2025-26475,0,0,bb522c072ef93dfba48b372ed229d0225844c8b3a620822d85a725743264d063,2025-05-20T18:01:18.020000 @@ -290610,8 +290613,8 @@ CVE-2025-30176,0,0,c1bd2b7ffef5f0e4c660a189483015165b303f3c3712bfe313b02ec0266a1 CVE-2025-30177,0,0,dd6bcf9daefbb6e1a68c3d702c2bf7abf53ae7032efaf201b8e1a6842e388876,2025-04-15T13:00:12.587000 CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000 CVE-2025-3018,0,0,699e90ef59bc974dffc7069ff5404d401834f1962c8486f8c32f7bd651f7ed16,2025-04-07T14:35:25.290000 -CVE-2025-30183,1,1,72c134920af7c21164e8b367c32a71916aa5d808c3a7f49279480d8a7b8aa8ea,2025-06-09T23:15:21.947000 -CVE-2025-30184,1,1,1dd5a24ae61ab9a0b9efe94150263e542def2dee94ec991dd8716e264e34ccc6,2025-06-09T22:15:21.440000 +CVE-2025-30183,0,0,72c134920af7c21164e8b367c32a71916aa5d808c3a7f49279480d8a7b8aa8ea,2025-06-09T23:15:21.947000 +CVE-2025-30184,0,0,1dd5a24ae61ab9a0b9efe94150263e542def2dee94ec991dd8716e264e34ccc6,2025-06-09T22:15:21.440000 CVE-2025-3019,0,0,70e870259e621652f69977e8a6f5a1f65a77b053f491785fe2e80412bfee7fd9,2025-04-01T20:26:30.593000 CVE-2025-30193,0,0,b5631b7234d99d822f89477675795fc1e4557911370ff922aff47427c545178b,2025-05-21T20:25:16.407000 CVE-2025-30194,0,0,30477cd5945bbe191bc812e7db4478e6b35f9fd4c4dfae67346b2f92b072ba8f,2025-04-29T14:15:32.390000 @@ -290836,13 +290839,13 @@ CVE-2025-30476,0,0,1b83fd85bea0d8069f29b8d374be29abf968282bb62616dfb04a4e47265c3 CVE-2025-3048,0,0,5eb6156d35bbaa6ace17e28077befe8dbbf8441f38642f57d7841d345fe9515f,2025-04-01T20:26:22.890000 CVE-2025-30485,0,0,f2856ee96c6d55a594aa71df88615bdd59c4c1a0f52dcb79297759def1147103,2025-04-07T14:18:34.453000 CVE-2025-3050,0,0,fc15ad23bd9afa2f65532303fa5ace006644959019c36eff80cd9adece20e167,2025-06-09T18:59:36.360000 -CVE-2025-30507,1,1,3ef30057326fd6dd90e5341a2543ac31f71160d25b7f96cd9934f503ced6fba4,2025-06-09T23:15:22.110000 +CVE-2025-30507,0,0,3ef30057326fd6dd90e5341a2543ac31f71160d25b7f96cd9934f503ced6fba4,2025-06-09T23:15:22.110000 CVE-2025-3051,0,0,03f9e07d76193917b8de9d74f13ff070438d20cd42142f9b8ee6c497180d4b37,2025-04-01T20:26:11.547000 CVE-2025-30510,0,0,65385fbb77c3413b4dbd5af09bd8095b856fda193f49543e9bce544dff1a2627,2025-04-16T13:25:37.340000 CVE-2025-30511,0,0,8563c461353588100bf079ab1328ff6e11ab2f047bd1165d78f20b19233b493f,2025-04-16T13:25:59.640000 CVE-2025-30512,0,0,830ca9aa3d060fbfd3176f9d9f5c7cd3b5eb14a6890ffb225ca2f7e33b59a139,2025-04-16T13:25:37.340000 CVE-2025-30514,0,0,191fbbadf6252574a267c8157cf87ff8e05e4c53e45be9178ae9e940181c57b2,2025-04-16T13:25:59.640000 -CVE-2025-30515,1,1,614960604329a0eaed1a817027e1b09f610d68c4507b5268d02b65ad0e798c79,2025-06-09T23:15:22.273000 +CVE-2025-30515,0,0,614960604329a0eaed1a817027e1b09f610d68c4507b5268d02b65ad0e798c79,2025-06-09T23:15:22.273000 CVE-2025-30516,0,0,6e9088ba36985b7325f51c1d3c78cbc79ac0a2c6c97bf904fbc9eebc8d7f06b9,2025-04-15T18:39:27.967000 CVE-2025-30520,0,0,36202f4247a4e2c05ed8fe3c2794dc6deb26ec20b4118dea06db3314c5e3a395,2025-04-01T20:26:11.547000 CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000 @@ -291537,6 +291540,7 @@ CVE-2025-3129,0,0,9ce9125356a6ba22d5c34f89147622c417a2440c2d1cce155406586438a1f6 CVE-2025-3130,0,0,3331839c90977481f0952c53c01c561e7ce3f9a4b6241dc2a679ea9232965364,2025-04-29T13:09:32.353000 CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db14c,2025-04-22T16:16:30.543000 CVE-2025-31324,0,0,f022551eb03f972b51d5adf3fa8b8bd88e48c383f69788d6260b2cb6e8237e8d,2025-05-06T20:59:33.773000 +CVE-2025-31325,1,1,2fcbe8c8ed524c0d3bedf5d98bbb9ec2838bcfdc406ffc7886d324875a19ad66,2025-06-10T01:15:21.060000 CVE-2025-31327,0,0,32f90adc396c5de5b649e8fa5cbb5b70c97a786ce6ce173df87cdac30806552e,2025-04-23T14:08:13.383000 CVE-2025-31328,0,0,7562727b37bc696206e3437191848ea7fd9fb71483caff96e2687c6513ba8732,2025-04-23T14:08:13.383000 CVE-2025-31329,0,0,1fc101be6dd06c49bba529860427b1b9723c1206bb0b29e1d558e09c6f01e194,2025-05-13T19:35:25.503000 @@ -292466,7 +292470,7 @@ CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b3 CVE-2025-3243,0,0,4b2bb05912dfa327561457ea9db9da3d0253e77015cecee72f471cd1253e6547,2025-05-28T21:10:35.537000 CVE-2025-32431,0,0,c841c5dc407677a5965f2a37065aa8f465f93e2d2ebac9e51959dc5b7aa3e0fc,2025-04-23T14:08:13.383000 CVE-2025-32432,0,0,431fc0fbedd754e521baa62824583ff2e21564f5b0b8bca365cd2f1af03e8472,2025-04-28T20:57:06.397000 -CVE-2025-32433,0,0,eb03f4e830e2501a42be89d3762405d2579da6f00fe77868ee93e070f2059b4f,2025-04-25T23:15:16.993000 +CVE-2025-32433,0,1,c5a9d28a1c91e6f5c5a104a336d9266257d0d414399621a278e42019174e4995,2025-06-10T01:00:02.087000 CVE-2025-32434,0,0,fdb96b52967a7fc43923938e661ad69461f69a5d08690c104a9b172e74ac945f,2025-05-28T13:14:20.750000 CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000 CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000 @@ -294484,9 +294488,23 @@ CVE-2025-4292,0,0,a1c46f024258686aac63cd7452c805b468fbd0c1f2665b5af0c4874925b38b CVE-2025-42921,0,0,fe45c9bf48d8b64b0cac9604dcc1ad3071452dfd7112cafe12dd9c33c82af017,2025-04-23T15:25:30.927000 CVE-2025-4293,0,0,d2f8ae34d311c55ca81099f103bba1d0cd562fd8e7c014930d8105d9c6667b18,2025-05-07T14:13:35.980000 CVE-2025-4297,0,0,2125bd423cd8ee8185dc917035443ae13b98a933b8dab9e4e9a974e1b93ea733,2025-05-16T17:44:43.850000 +CVE-2025-42977,1,1,1ac61219c38624ba547d8f7bec0b2d0820c42418cd44a366c65ce285f3850f0c,2025-06-10T01:15:21.220000 CVE-2025-4298,0,0,e54afc5cb294aa37ab5ddf7cb60307aaa6afeb78004ee588006228c0c5b744b4,2025-05-13T20:06:19.080000 +CVE-2025-42982,1,1,88cd99a487e3936fb062a772b03dc1d495eafb1afca32a9714a4fd60b53375ab,2025-06-10T01:15:21.383000 +CVE-2025-42983,1,1,907df10d19a0af4eaf40735ec8049c00a4f446b2ae026d7ba098776318a9bcd2,2025-06-10T01:15:21.537000 +CVE-2025-42984,1,1,049e4bfe682fa2a19ffcda7fe869019e9238ed2e207743d7c69f71dd7a9c70fc,2025-06-10T01:15:21.703000 +CVE-2025-42987,1,1,f7224850f4dedc8582d139088576015f05cbbc53eae851ac4a59aa2f7a32ae32,2025-06-10T01:15:21.860000 +CVE-2025-42988,1,1,d7b5768857963eb5b7ba389b0f5947eb3dfff3e17e8871d1b831cc55e6d62bb4,2025-06-10T01:15:22.023000 +CVE-2025-42989,1,1,07a9c7beea7670d52713696588e0e3a8171ff6f98af685732020f5721b2d4a0c,2025-06-10T01:15:22.183000 CVE-2025-4299,0,0,cc4a3e24204515aaf4850521a61cefe5731008dd8b97ebba472ff5c5a801f5ca,2025-05-13T20:06:00.377000 +CVE-2025-42990,1,1,7c7d9d4e991146fc95980197917d70d4d49def267d6e4b3af1e080c063e982e9,2025-06-10T01:15:22.340000 +CVE-2025-42991,1,1,5d94db5e74f196325e7b7a1f6689dd7055b1046bc26eb28c59f56baebad13632,2025-06-10T01:15:22.507000 +CVE-2025-42993,1,1,66b41379931324b0dba728ff9055984d96dd46cd718ea1d6777b3501762f85df,2025-06-10T01:15:22.667000 +CVE-2025-42994,1,1,1acda648db7bed6c0c5c5cbf4540585a56bb09e264c920528bfa3080f7df8d4e,2025-06-10T01:15:22.823000 +CVE-2025-42995,1,1,02b8fe825e71fa8ad5db974a18f13c02f228fdb95891aff57916b904646eaa4f,2025-06-10T01:15:22.980000 +CVE-2025-42996,1,1,dfa0ccb2d1f1fdba36694a37bbad5d2819869c78df12386f9597666d5fb730ba,2025-06-10T01:15:23.143000 CVE-2025-42997,0,0,0db878c2cfc8ff1365eb2be4d72f29ef4ec6fbd53f1d04e9ce03d23507611246,2025-05-13T19:35:25.503000 +CVE-2025-42998,1,1,b8fecffd9fe778519940687ede9d00858d726db9a1b595ceebef0602ef0da68e,2025-06-10T01:15:23.307000 CVE-2025-42999,0,0,a0a9942912bd021b739fb32ce123af4bb7497f07493d1c056f2a75451f04f20d,2025-05-16T19:44:49.400000 CVE-2025-4300,0,0,f7c03ed92744380706d903a9f694588f32e405152084eae0fc0569337f5db7ce,2025-05-13T20:22:08.717000 CVE-2025-43000,0,0,e31fc74811b3e3770c864cd0f324b9ae9ae79a3c82cdc5b33a35261048a81925,2025-05-13T19:35:25.503000 @@ -294521,7 +294539,7 @@ CVE-2025-4313,0,0,96adfe49118b3dc0ffa2d766514becfcea2a2e173aec97c2971381d69b1c7c CVE-2025-4314,0,0,89cfceef9bbe0699f164e05975fe9dcf3155dc1437b8d0bc5f6540ae67e31e0a,2025-05-14T20:57:14.900000 CVE-2025-4316,0,0,a3cffae4e2b5f53f1a661b0b9d82da9e0409120ddd80fb5f02808f802009be7c,2025-05-14T13:15:48.907000 CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000 -CVE-2025-4318,0,0,73cdf24936a82810c3179f2491c41f7aa46df0277cfdc5785e8661e453babeab,2025-05-05T20:54:19.760000 +CVE-2025-4318,0,1,5887b3ce06385074832e5ab93ef36220685a1c2570be13ee561ec8804f3cb15a,2025-06-10T01:15:23.483000 CVE-2025-4322,0,0,e2ee1e5545786d5194d1f34f3de88e5515751a08a7c9f4ad7a4ef29aeb6cb910,2025-05-21T20:25:16.407000 CVE-2025-4323,0,0,a92a49c291d6e9dc74ae26b690a6171ab8ae00628949ef68fbb0006bd7671b31,2025-05-07T14:13:35.980000 CVE-2025-4324,0,0,58fa7de6e56ad865b5257250bcee13b8e1686fe64bd3ad7adcfbc671861c19e1,2025-05-07T14:13:35.980000 @@ -296401,7 +296419,7 @@ CVE-2025-49137,0,0,4a9bc70d2fa871bf4605433ea43fb5042c491536b67aeba8f2381a10a42a4 CVE-2025-49138,0,0,afec9b8853bb09177fbd685c5c96dfab6c791e5562e74f32f9c30e5ddd13eaf3,2025-06-09T21:15:47.047000 CVE-2025-49139,0,0,298d2b55fe3f58702c8a8336073404abfb72895885d946c55a5eec2f31d44687,2025-06-09T21:15:47.203000 CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000 -CVE-2025-49140,1,1,41fcec6243aa5d7f5df8648df8084e34894ac7ed31a6ee04e5726a36fd81c97d,2025-06-09T22:15:22.153000 +CVE-2025-49140,0,0,41fcec6243aa5d7f5df8648df8084e34894ac7ed31a6ee04e5726a36fd81c97d,2025-06-09T22:15:22.153000 CVE-2025-49141,0,0,de0e15852e3a7a9695ab23fa0f5963a9591d4cd2c49227521c6a4df241d53639,2025-06-09T21:15:47.360000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000 @@ -297176,11 +297194,17 @@ CVE-2025-5894,0,0,654242cace97981f86dd5829ceaa9ac008f0c3374b73eef1c99cc2c32cf2e6 CVE-2025-5895,0,0,c6e4185df93ec71c290d1297e23624cb6c7281ee8d109da1434f874f78f613b2,2025-06-09T20:15:25.890000 CVE-2025-5896,0,0,60e8b583acf869ca7196943fa8b43ab76054382ca45e05f2e85ddaeb58922466,2025-06-09T21:15:47.517000 CVE-2025-5897,0,0,6ba518894d0e57a77d37b1420811a6c6aed816ec1e63b75c7cfbf61d80aa051f,2025-06-09T21:15:47.707000 -CVE-2025-5898,1,1,cce039980166689a3acddc08d6acf70174a79615ac9d44ba32eeb021665ac413,2025-06-09T22:15:22.327000 -CVE-2025-5899,1,1,6fc7e077ed900ce38ad161acad8813d50033b2c9b5fa8abbaa53775be2e7228c,2025-06-09T22:15:22.557000 -CVE-2025-5900,1,1,930444d7eeb3b1ddd8b8ac3981a77be2d0faef64341ce026a26222e796099745,2025-06-09T22:15:22.790000 -CVE-2025-5901,1,1,82dbf68b7853fd88172f4ff0ab8f21b89e4d8a17877df01445ce4727961959d0,2025-06-09T23:15:22.433000 -CVE-2025-5902,1,1,9babf0453954c075cf5597a7430a1c71b03244df31f2828e4e3b0b0c3cc0dc9b,2025-06-09T23:15:22.617000 +CVE-2025-5898,0,0,cce039980166689a3acddc08d6acf70174a79615ac9d44ba32eeb021665ac413,2025-06-09T22:15:22.327000 +CVE-2025-5899,0,0,6fc7e077ed900ce38ad161acad8813d50033b2c9b5fa8abbaa53775be2e7228c,2025-06-09T22:15:22.557000 +CVE-2025-5900,0,0,930444d7eeb3b1ddd8b8ac3981a77be2d0faef64341ce026a26222e796099745,2025-06-09T22:15:22.790000 +CVE-2025-5901,0,0,82dbf68b7853fd88172f4ff0ab8f21b89e4d8a17877df01445ce4727961959d0,2025-06-09T23:15:22.433000 +CVE-2025-5902,0,0,9babf0453954c075cf5597a7430a1c71b03244df31f2828e4e3b0b0c3cc0dc9b,2025-06-09T23:15:22.617000 +CVE-2025-5903,1,1,f0e66e1274fe9208f52179ff8e87a1b9dffe6bdbd486c2e3eb77086bd9a74b46,2025-06-10T00:15:22.243000 +CVE-2025-5904,1,1,32aad757bab1a3ced172091134f849188d9b452ade8ed80bcf453849be87415c,2025-06-10T00:15:22.453000 +CVE-2025-5905,1,1,4640c69ee55ba9dd6382404c2da278693c59fedc07931752dc25ae9a7fc40a6d,2025-06-10T00:15:22.653000 +CVE-2025-5906,1,1,aa989b7dcccb5c034fc1eea8eff37f01bc4327bb2f6ad2c0f749ad5ccfddb4ac,2025-06-10T01:15:23.720000 +CVE-2025-5907,1,1,5d329676c8670997ed9bbd9ec920c44010fa9710ac335febffe90162e564e157,2025-06-10T01:15:23.963000 +CVE-2025-5908,1,1,37a781f179b1660861001bee4d6c7fb2b67dae046e6af7975b6ededfbac21b41,2025-06-10T01:15:24.167000 CVE-2025-5914,0,0,ca2950efdb51e21bbb1b52a25d765df8575e0ffa29446d96c03c3ef2bb78c27f,2025-06-09T20:15:26.123000 CVE-2025-5915,0,0,0e67ccac333c7a11c03869b01cbfabaf1cb283cb5a64338a4f2ca5aab164415e,2025-06-09T20:15:26.317000 CVE-2025-5916,0,0,de33dac47619c4e1d912727e7eb0e9fccd9c7c67167013ac3aa335bd776c0a9e,2025-06-09T20:15:27.170000