mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-06-19T18:00:19.544499+00:00
This commit is contained in:
parent
5386f51c9c
commit
47d2332c51
16
CVE-2006/CVE-2006-21xx/CVE-2006-2192.json
Normal file
16
CVE-2006/CVE-2006-21xx/CVE-2006-2192.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2006-2192",
|
||||
"sourceIdentifier": "security@debian.org",
|
||||
"published": "2025-06-19T16:15:21.717",
|
||||
"lastModified": "2025-06-19T16:15:21.717",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
78
CVE-2025/CVE-2025-502xx/CVE-2025-50200.json
Normal file
78
CVE-2025/CVE-2025-502xx/CVE-2025-50200.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-50200",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-19T17:15:26.123",
|
||||
"lastModified": "2025-06-19T17:15:26.123",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-524xx/CVE-2025-52464.json
Normal file
94
CVE-2025/CVE-2025-524xx/CVE-2025-52464.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-52464",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-19T16:15:22.327",
|
||||
"lastModified": "2025-06-19T16:15:22.327",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Meshtastic is an open source mesh networking solution. In versions from 2.5.0 to before 2.6.11, the flashing procedure of several hardware vendors was resulting in duplicated public/private keys. Additionally, the Meshtastic was failing to properly initialize the internal randomness pool on some platforms, leading to possible low-entropy key generation. When users with an affected key pair sent Direct Messages, those message could be captured and decrypted by an attacker that has compiled the list of compromised keys. This issue has been patched in version 2.6.11 where key generation is delayed til the first time the LoRa region is set, along with warning users when a compromised key is detected. Version 2.6.12 furthers this patch by automatically wiping known compromised keys when found. A workaround to this vulnerability involves users doing a complete device wipe to remove vendor-cloned keys."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.5,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-331"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/meshtastic/firmware/commit/4bf2dd04aeeccc4ba20c79bcaad7a572aabdecad",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/meshtastic/firmware/commit/55b2bbf93756fc7bbbfdbc7cbf29f88e6b637f22",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/meshtastic/firmware/commit/e5f6804421ac4b76dd31980250a505dba24c2aa6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/meshtastic/firmware/commit/e623c70bd0c2ab9db9baf04888e19d1428310bb9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/meshtastic/firmware/security/advisories/GHSA-gq7v-jr8c-mfr7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-62xx/CVE-2025-6269.json
Normal file
145
CVE-2025/CVE-2025-62xx/CVE-2025-6269.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6269",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-19T16:15:22.797",
|
||||
"lastModified": "2025-06-19T16:15:22.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in HDF5 up to 1.14.6. Affected by this vulnerability is the function H5C__reconstruct_cache_entry of the file H5Cimage.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 4.3,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HDFGroup/hdf5/issues/5579",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/20626503/reproduce.tar.gz",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313273",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313273",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592587",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-62xx/CVE-2025-6270.json
Normal file
145
CVE-2025/CVE-2025-62xx/CVE-2025-6270.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6270",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-19T17:15:27.167",
|
||||
"lastModified": "2025-06-19T17:15:27.167",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5FS__sect_find_node of the file H5FSsection.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 4.3,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HDFGroup/hdf5/issues/5580",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/20626642/reproduce.tar.gz",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313274",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313274",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592588",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-19T16:00:20.308673+00:00
|
||||
2025-06-19T18:00:19.544499+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-19T15:15:20.810000+00:00
|
||||
2025-06-19T17:15:27.167000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,28 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
298709
|
||||
298714
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-24916](CVE-2024/CVE-2024-249xx/CVE-2024-24916.json) (`2025-06-19T14:15:44.983`)
|
||||
- [CVE-2025-48886](CVE-2025/CVE-2025-488xx/CVE-2025-48886.json) (`2025-06-19T15:15:20.473`)
|
||||
- [CVE-2025-49014](CVE-2025/CVE-2025-490xx/CVE-2025-49014.json) (`2025-06-19T15:15:20.650`)
|
||||
- [CVE-2025-6267](CVE-2025/CVE-2025-62xx/CVE-2025-6267.json) (`2025-06-19T14:15:55.323`)
|
||||
- [CVE-2025-6268](CVE-2025/CVE-2025-62xx/CVE-2025-6268.json) (`2025-06-19T15:15:20.810`)
|
||||
- [CVE-2006-2192](CVE-2006/CVE-2006-21xx/CVE-2006-2192.json) (`2025-06-19T16:15:21.717`)
|
||||
- [CVE-2025-50200](CVE-2025/CVE-2025-502xx/CVE-2025-50200.json) (`2025-06-19T17:15:26.123`)
|
||||
- [CVE-2025-52464](CVE-2025/CVE-2025-524xx/CVE-2025-52464.json) (`2025-06-19T16:15:22.327`)
|
||||
- [CVE-2025-6269](CVE-2025/CVE-2025-62xx/CVE-2025-6269.json) (`2025-06-19T16:15:22.797`)
|
||||
- [CVE-2025-6270](CVE-2025/CVE-2025-62xx/CVE-2025-6270.json) (`2025-06-19T17:15:27.167`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2021-47144](CVE-2021/CVE-2021-471xx/CVE-2021-47144.json) (`2025-06-19T14:15:24.327`)
|
||||
- [CVE-2022-49299](CVE-2022/CVE-2022-492xx/CVE-2022-49299.json) (`2025-06-19T14:15:34.170`)
|
||||
- [CVE-2024-36022](CVE-2024/CVE-2024-360xx/CVE-2024-36022.json) (`2025-06-19T14:15:45.160`)
|
||||
- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2025-06-19T14:15:45.237`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
23
_state.csv
23
_state.csv
@ -17972,6 +17972,7 @@ CVE-2006-2188,0,0,617fe8a4a09e7b96851372e97b83231f592dbb3159ef647dde40b46ceac345
|
||||
CVE-2006-2189,0,0,0576f249e04a3de9327755edf16ff0fc7d99ef781d8921d2d63129ff759491a8,2025-04-03T01:03:51.193000
|
||||
CVE-2006-2190,0,0,9ae4f0eafede6e9fed5380138af147cb08229abed1583537aaefc7557f022ccc,2025-04-03T01:03:51.193000
|
||||
CVE-2006-2191,0,0,6b338e607701f7dec383a6fc9fc249b92a610ebc36d621236360932ef27c2e9c,2025-04-03T01:03:51.193000
|
||||
CVE-2006-2192,1,1,b5fd94f6fcd9f7ee1155cb50046bb23693c266880888a8bb7f995dbf1552a256,2025-06-19T16:15:21.717000
|
||||
CVE-2006-2193,0,0,77d6ce2e3d4ffa2845b02d5dc0ea7ad5da26e16633950d6ac62ccc91772a61ac,2025-04-03T01:03:51.193000
|
||||
CVE-2006-2194,0,0,953a6f0d21137b2046a19b4e85cd492c231e8a29f885eb74f6894022211eedca,2025-04-03T01:03:51.193000
|
||||
CVE-2006-2195,0,0,5dd93295f11b2006c6aa21449473d6ea5ae5c5ace2353ee86ac452c395c6152f,2025-04-03T01:03:51.193000
|
||||
@ -187473,7 +187474,7 @@ CVE-2021-47140,0,0,c3dcf5ccce19de7e841d31a01af1a7c0a0ac783be101cc1ae90902a46a0b7
|
||||
CVE-2021-47141,0,0,e61404ed12a5ac1ae29217dd66abf34d1c9993567a22e9f40130f3f47929515b,2024-12-20T13:52:15.857000
|
||||
CVE-2021-47142,0,0,6ad377d956d05ee5b77de4a0fcd9c1e12bb267ce6b693f08e9c8a001b07f1a24,2024-12-17T14:56:12.967000
|
||||
CVE-2021-47143,0,0,e3b00c03aadd7fe0eba996ce0aa700ffe68266a62c0c1a319c4d75334f72fab4,2025-03-13T21:09:12.133000
|
||||
CVE-2021-47144,0,1,45db3cba27ad95d1197ebaca09ce2daec1e6ac06a78c7071ee0d59a43f2c03bb,2025-06-19T14:15:24.327000
|
||||
CVE-2021-47144,0,0,45db3cba27ad95d1197ebaca09ce2daec1e6ac06a78c7071ee0d59a43f2c03bb,2025-06-19T14:15:24.327000
|
||||
CVE-2021-47145,0,0,43d8e0b6ecfa4a172c868b86d0d689e74785d9a21693602a5589db57ba57a745,2024-12-20T13:54:08.207000
|
||||
CVE-2021-47146,0,0,dbdc77471ed516b8586014a2485eb48d7b639119ac0499cf0380be4cece2ea03,2024-12-20T13:56:08.667000
|
||||
CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000
|
||||
@ -213725,7 +213726,7 @@ CVE-2022-49295,0,0,5e38c4c123787e1ee751a94134f2b29ad572a5b12c9b6211fdebdc37dfbd2
|
||||
CVE-2022-49296,0,0,588351356d12270e478dd63a43a961d11715903a90acd8e6708c24c601fcaa4b,2025-04-14T20:08:21.310000
|
||||
CVE-2022-49297,0,0,8d1c06a4aa23def0f72824aed39805f1f922ad45e1d7b60048b08e6a7aa701f7,2025-02-26T07:01:06.527000
|
||||
CVE-2022-49298,0,0,6ef51ed7003ff5ce2a107fdf5b5fd431bea1536c5c9ba8aad25226015ac10a10,2025-04-14T20:08:32.443000
|
||||
CVE-2022-49299,0,1,858e440c602b388e1110e4a6eed2edf8cf9a1182fd6623384ad6f3ad00234ba0,2025-06-19T14:15:34.170000
|
||||
CVE-2022-49299,0,0,858e440c602b388e1110e4a6eed2edf8cf9a1182fd6623384ad6f3ad00234ba0,2025-06-19T14:15:34.170000
|
||||
CVE-2022-4930,0,0,7e21b5888ba08ac9f714e1d7cc949231011fc7edea53dba39ac9bb8b71344e77,2024-11-21T07:36:16.550000
|
||||
CVE-2022-49300,0,0,b797c5faa060878b9beb923e26a960451e4ac34b94b1fc227e08b825a7d5668b,2025-04-14T20:08:41.297000
|
||||
CVE-2022-49301,0,0,136481d6f3b44bb5b873bb10b1c743de69545e148cb371975e40d2524eedecd4,2025-04-14T20:08:57.483000
|
||||
@ -253939,7 +253940,7 @@ CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b
|
||||
CVE-2024-24911,0,0,000ec366e410a6c31f93ab7f8a2e5fcf30159e4251e9a0263b609a65802a079d,2025-02-06T14:15:29.577000
|
||||
CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000
|
||||
CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000
|
||||
CVE-2024-24916,1,1,f386f1592d60dd44d86fab84a74d22c9e2dceb453c216f7377cb501ea1221570,2025-06-19T14:15:44.983000
|
||||
CVE-2024-24916,0,0,f386f1592d60dd44d86fab84a74d22c9e2dceb453c216f7377cb501ea1221570,2025-06-19T14:15:44.983000
|
||||
CVE-2024-24919,0,0,79021d06164055237b10fa49935e385f8096a39629b5d8ac929ac9e336c9c5cc,2025-01-27T21:42:18.743000
|
||||
CVE-2024-2492,0,0,a9b15c0f5d53de03b8229afca1c8a7b4e7a78c54ba58e9584411863892de05ef,2025-01-09T17:01:54.423000
|
||||
CVE-2024-24920,0,0,dc0bb25ed0284e07ee39402f3b0f41ee21d4b48f63522bd3cf324ad5fae05c1c,2024-11-21T08:59:58.420000
|
||||
@ -262523,7 +262524,7 @@ CVE-2024-36019,0,0,f02053cb973e1c96d485baf06035b62edccf042bea033f3776e823e91a178
|
||||
CVE-2024-3602,0,0,d3cbf668ee81c993c6c1a222abdc99fc263e0a164b77fb771b4ebab250b2fbc2,2024-11-21T09:29:57.953000
|
||||
CVE-2024-36020,0,0,25e42c8a88f0ddc6971355bfaa1fe3e1077dd58b980e3b76b47fcef300a19108,2024-11-21T09:21:27.090000
|
||||
CVE-2024-36021,0,0,e329f3d46bec53961296646b95182fcee51db869a5da34a000bb9ec4b09a82e5,2024-11-21T09:21:27.280000
|
||||
CVE-2024-36022,0,1,51dac97c1f219f060ef0fddf94e1fe59968e0e0d8f6538dfb52154bc9e602f12,2025-06-19T14:15:45.160000
|
||||
CVE-2024-36022,0,0,51dac97c1f219f060ef0fddf94e1fe59968e0e0d8f6538dfb52154bc9e602f12,2025-06-19T14:15:45.160000
|
||||
CVE-2024-36023,0,0,e5bd5a963b07073a291c96616b254515ad4a6774864c3c2874fadf0832668b50,2024-11-21T09:21:27.523000
|
||||
CVE-2024-36024,0,0,e81683da475e946ecb026d2acbb1cb6964660d51a3ff9882d05006bff012115d,2024-11-21T09:21:27.663000
|
||||
CVE-2024-36025,0,0,33c56aef941738177fa17f1493b08e4d2d3a3e4eea32429e0a62f0a601334f80,2024-11-21T09:21:27.783000
|
||||
@ -269449,7 +269450,7 @@ CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cd
|
||||
CVE-2024-44952,0,0,6075a53e4a12ab3edde68b2f32d76123b685c2ffd8a80a3e387b8f8a1b55017c,2024-11-09T10:15:04.710000
|
||||
CVE-2024-44953,0,0,d6bdfb63db04ea95627162f46f471f3f784f46dc1c5f5c5598b91e3343ece3d2,2025-03-07T18:15:40.950000
|
||||
CVE-2024-44954,0,0,ca1483f1bc80b6fc317dee185ca5bfaca3fb71a4e1bb2be04aaa089f77305fa8,2024-10-10T18:02:42.307000
|
||||
CVE-2024-44955,0,1,e4a2492d3ee52c185351f510b38f12ba865b64e3f4b497cfe9040977e631629e,2025-06-19T14:15:45.237000
|
||||
CVE-2024-44955,0,0,e4a2492d3ee52c185351f510b38f12ba865b64e3f4b497cfe9040977e631629e,2025-06-19T14:15:45.237000
|
||||
CVE-2024-44956,0,0,86920dddd41f37c850fb3187de0d04345b34edcff9616626c578c463883b545f,2024-09-06T16:37:11.777000
|
||||
CVE-2024-44957,0,0,1cf763e8c9a7c6633066ea97c4cd268591794ba04e060d517e94af511c95351c,2024-09-06T16:37:00.077000
|
||||
CVE-2024-44958,0,0,10ffa07c682ea617924ba9d633879bcec7023ba11be7e36066d5dd8fd1f703a6,2024-10-10T17:56:24.467000
|
||||
@ -297392,7 +297393,7 @@ CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe
|
||||
CVE-2025-48882,0,0,0675a44f5475635d3b90df25f21b843f71a594f25b60ebf1257710a520ba2459,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48883,0,0,14507842d3e0b613f4c9b8d62ad8df05d93e1c97510cf43e163a8411a419850f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48885,0,0,a22cad12e847f8e3d6cac2d0c207ccbc3235380976544a38095804a3e40d9d2f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48886,1,1,804fb54f649dfaed4a17820c45e257f12c5f661ecd7371b6b111563aa366ad58,2025-06-19T15:15:20.473000
|
||||
CVE-2025-48886,0,0,804fb54f649dfaed4a17820c45e257f12c5f661ecd7371b6b111563aa366ad58,2025-06-19T15:15:20.473000
|
||||
CVE-2025-48887,0,0,d715c137954000dfa4d0fdb3ecdb8e16b928f4dac02dc271a6a5d4052e6a12f9,2025-06-19T00:55:27.710000
|
||||
CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44ccf65,2025-06-05T20:12:23.777000
|
||||
CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000
|
||||
@ -297480,7 +297481,7 @@ CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e
|
||||
CVE-2025-49011,0,0,3665e61b0cd57a602b77e200d37022bd1c16f58fa0f0e634b56cbf0760aaef11,2025-06-09T12:15:47.880000
|
||||
CVE-2025-49012,0,0,2faa3b03d38706521ba412ef015f2b3ddc23776e15e89fc334c8483419ee59d3,2025-06-06T14:07:28.330000
|
||||
CVE-2025-49013,0,0,53845c94e81c77646a01f8c00c78ad71027f55ce3164819fe14a34a7c91aff28,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49014,1,1,856d9c372196e9d3a725054d166df8953c318647d8bc5aee2ea2794c95fb1a3a,2025-06-19T15:15:20.650000
|
||||
CVE-2025-49014,0,0,856d9c372196e9d3a725054d166df8953c318647d8bc5aee2ea2794c95fb1a3a,2025-06-19T15:15:20.650000
|
||||
CVE-2025-49015,0,0,7a51f7c5ae45f0bd54ecb4209bb2e64263c11f32f2190e16ff2a6f3efe9375e5,2025-06-18T15:15:27.550000
|
||||
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
|
||||
CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000
|
||||
@ -297876,6 +297877,7 @@ CVE-2025-50182,0,0,93456784c188b1b8503b694ba28732c6770780f754e8588d4b113b9fa2491
|
||||
CVE-2025-50183,0,0,577421c902a6680948fa734ac4a401e6dec872b90f6732d2f36c75be4e0482da,2025-06-19T03:15:25.717000
|
||||
CVE-2025-5019,0,0,9e77689bce77b4f77cc10eef8ecd39dc784fee948cba6d9ab205fa6a8f33f986,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245ee,2025-06-13T18:55:32.903000
|
||||
CVE-2025-50200,1,1,9dec4fb49ce3f8a9e6b4df92d9e0335c8d08c7812c1a7e6b320f4940f74207ae,2025-06-19T17:15:26.123000
|
||||
CVE-2025-50201,0,0,6c0ac0a1b3f20c50cd6e6108194b16fda3c838e050a9f8f2f931be0a16f0b604,2025-06-19T04:15:49.340000
|
||||
CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000
|
||||
CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000
|
||||
@ -298058,6 +298060,7 @@ CVE-2025-52444,0,0,93054904ad530554737df8cd7258142853cfe2090c496970f4b20356b1869
|
||||
CVE-2025-52445,0,0,32bf5fa45c16b67da856f5d24d990c19398078dd71ca0f2526b5098284f3b5db,2025-06-17T03:15:25.673000
|
||||
CVE-2025-5245,0,0,76dfb770c29fdb4cddbdbfbfa1fee59cf2a7272fa687dfaa6e702792fcfc63df,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e82,2025-05-28T20:38:00.033000
|
||||
CVE-2025-52464,1,1,fe445d840cfd2d5fa387a02e4bee7c790147073ebbee6cc5031929c934267ddf,2025-06-19T16:15:22.327000
|
||||
CVE-2025-52467,0,0,1d44b4ec1f24c8fb925117e58cded1f52726868651b6f32ac341ea831aaa464f,2025-06-19T03:15:25.870000
|
||||
CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000
|
||||
CVE-2025-52474,0,0,90aca3999fbf5ca7dd4557d7388545c99ea4ce981f2f9c8d02593988d225c460,2025-06-19T04:15:53.793000
|
||||
@ -298706,5 +298709,7 @@ CVE-2025-6201,0,0,fae5d9a8c9dcb541916adb0b451bda886e1fe3141eb6c37705d42f0b95790d
|
||||
CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000
|
||||
CVE-2025-6240,0,0,afdbdd4423b9b6d85b5822d8414b4fba12d402c8710eb5b02e519fcba3d4ca1c,2025-06-18T15:15:28.187000
|
||||
CVE-2025-6266,0,0,f88678c0ca6c6b4793348c364f2d4b51fa863b9a2b4f605e9b4cf59a8ae65084,2025-06-19T12:15:20.537000
|
||||
CVE-2025-6267,1,1,abd4330b3858f9e21bdcec6fd248eb70ba09cf96ae2d8c82b03451247b5b4eab,2025-06-19T14:15:55.323000
|
||||
CVE-2025-6268,1,1,6fa9140584959e948202f092432ac46aad7bd9559cbc482008db9c6d49de4338,2025-06-19T15:15:20.810000
|
||||
CVE-2025-6267,0,0,abd4330b3858f9e21bdcec6fd248eb70ba09cf96ae2d8c82b03451247b5b4eab,2025-06-19T14:15:55.323000
|
||||
CVE-2025-6268,0,0,6fa9140584959e948202f092432ac46aad7bd9559cbc482008db9c6d49de4338,2025-06-19T15:15:20.810000
|
||||
CVE-2025-6269,1,1,30eec445a7f329623315e17a43279c26cfd7baf4f1b9b7e6b978e627caa57830,2025-06-19T16:15:22.797000
|
||||
CVE-2025-6270,1,1,f7a2c6fa4812a82383b1679e78a47e55be72cdde4b381f8063bad680538f7f1f,2025-06-19T17:15:27.167000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user