diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json index a81c30780b6..949f117ed71 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49113", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T05:15:53.420", - "lastModified": "2025-06-02T18:15:24.640", + "lastModified": "2025-06-09T04:15:35.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -87,6 +87,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/06/02/3", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json new file mode 100644 index 00000000000..27b972536d2 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5859.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5859", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T04:15:45.350", + "lastModified": "2025-06-09T04:15:45.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /test-details.php. The manipulation of the argument assignto leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/65", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311605", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311605", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591443", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json new file mode 100644 index 00000000000..3471959246e --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5860.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5860", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T04:15:48.427", + "lastModified": "2025-06-09T04:15:48.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Maid Hiring Management System 1.0. This affects an unknown part of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kakalalaww/CVE/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311619", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311619", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591910", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json new file mode 100644 index 00000000000..1e74ee5d644 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5861.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5861", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T05:15:20.297", + "lastModified": "2025-06-09T05:15:20.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This vulnerability affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC7-fromadvsetlanip-20a53a41781f80038f4fc4b9d927eb9a?source=copy_link", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311620", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311620", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591960", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json new file mode 100644 index 00000000000..58b7ffe40f7 --- /dev/null +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5862.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5862", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-09T05:15:21.887", + "lastModified": "2025-06-09T05:15:21.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. This issue affects the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC7-formSetPPTPUserList-20a53a41781f806ca124cbdf99bff931?source=copy_link", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311621", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311621", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.591980", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index fdf41315620..0cedf5c085b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-09T04:00:19.887988+00:00 +2025-06-09T06:00:18.891645+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-09T03:15:26.190000+00:00 +2025-06-09T05:15:21.887000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297017 +297021 ``` ### CVEs added in the last Commit Recently added CVEs: `4` -- [CVE-2025-5855](CVE-2025/CVE-2025-58xx/CVE-2025-5855.json) (`2025-06-09T02:15:23.293`) -- [CVE-2025-5856](CVE-2025/CVE-2025-58xx/CVE-2025-5856.json) (`2025-06-09T03:15:25.353`) -- [CVE-2025-5857](CVE-2025/CVE-2025-58xx/CVE-2025-5857.json) (`2025-06-09T03:15:26.000`) -- [CVE-2025-5858](CVE-2025/CVE-2025-58xx/CVE-2025-5858.json) (`2025-06-09T03:15:26.190`) +- [CVE-2025-5859](CVE-2025/CVE-2025-58xx/CVE-2025-5859.json) (`2025-06-09T04:15:45.350`) +- [CVE-2025-5860](CVE-2025/CVE-2025-58xx/CVE-2025-5860.json) (`2025-06-09T04:15:48.427`) +- [CVE-2025-5861](CVE-2025/CVE-2025-58xx/CVE-2025-5861.json) (`2025-06-09T05:15:20.297`) +- [CVE-2025-5862](CVE-2025/CVE-2025-58xx/CVE-2025-5862.json) (`2025-06-09T05:15:21.887`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2025-49113](CVE-2025/CVE-2025-491xx/CVE-2025-49113.json) (`2025-06-09T04:15:35.803`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bcc298052e3..91e557f6ce1 100644 --- a/_state.csv +++ b/_state.csv @@ -296288,7 +296288,7 @@ CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d CVE-2025-4910,0,0,d0c7584b70570a0f60f72259e5222dec42c6f070aafbec7da031c0738cd595d2,2025-05-21T17:40:58.137000 CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f3696f,2025-05-21T13:26:25.383000 CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000 -CVE-2025-49113,0,0,78e1e19e9b432b93ff96a76bc8575f71429241f56372df732f7bdb78a4469ea1,2025-06-02T18:15:24.640000 +CVE-2025-49113,0,1,3740e35451abe1a78e20b6fcfcc30939518c1442be6c83079800621122ba29db,2025-06-09T04:15:35.803000 CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000 CVE-2025-49127,0,0,75d721494d98d4722f3d78798cf05e23db38a7c6bebef6c22b8d9a8d81898d86,2025-06-06T21:15:23.137000 CVE-2025-49128,0,0,42874cd39e27e420db84f117bd69f6a93c7d0ef6555be75306d09ad33e291157,2025-06-06T22:15:23.427000 @@ -297012,7 +297012,11 @@ CVE-2025-5851,0,0,13fe5198f7267a4e27f528492f2cbeb959a306be0a727a2f552e7477f71459 CVE-2025-5852,0,0,d225815d31c84b2f98b19940a2b2527a405fb8eb6455019740c3f9c3f4d9aaeb,2025-06-09T01:15:20.633000 CVE-2025-5853,0,0,8a925efdf9baed82eeaa5d4344467c3960aa5b0377e2b820702b39dfaf7cac38,2025-06-09T01:15:21.583000 CVE-2025-5854,0,0,d0c01d995a2cd5c0e612a876bbfd342ba9170457d0de251147bb9f568cadc44d,2025-06-09T01:15:21.777000 -CVE-2025-5855,1,1,d297afa07413f8f41b9c10d467cc6d2d69e3eed5d9294778e365ecd234f9539f,2025-06-09T02:15:23.293000 -CVE-2025-5856,1,1,78118142298e16e53ebce08fcc0e868d82e15e050c9ef03ea368f6548b1fd763,2025-06-09T03:15:25.353000 -CVE-2025-5857,1,1,be4dd6b66ef955da24b6daef73272f333f337110f5eac2fe46d9617044524617,2025-06-09T03:15:26 -CVE-2025-5858,1,1,887c9b62596baae7ae622fb724b298af9500480ddd2ebefb98dec0f8d58b3ee9,2025-06-09T03:15:26.190000 +CVE-2025-5855,0,0,d297afa07413f8f41b9c10d467cc6d2d69e3eed5d9294778e365ecd234f9539f,2025-06-09T02:15:23.293000 +CVE-2025-5856,0,0,78118142298e16e53ebce08fcc0e868d82e15e050c9ef03ea368f6548b1fd763,2025-06-09T03:15:25.353000 +CVE-2025-5857,0,0,be4dd6b66ef955da24b6daef73272f333f337110f5eac2fe46d9617044524617,2025-06-09T03:15:26 +CVE-2025-5858,0,0,887c9b62596baae7ae622fb724b298af9500480ddd2ebefb98dec0f8d58b3ee9,2025-06-09T03:15:26.190000 +CVE-2025-5859,1,1,6b7923abeb300c134b7519954ec60c06a2d244931efd3f53a9e5517b47c9fae2,2025-06-09T04:15:45.350000 +CVE-2025-5860,1,1,b998a3183531c6c25fbb639a8c7d53f3d06c5149568a0f8364158a6bef400433,2025-06-09T04:15:48.427000 +CVE-2025-5861,1,1,a862f0db4e6993f9ab273ba42d1a9716562ac19fbf1131e7894a39cb6ec3e418,2025-06-09T05:15:20.297000 +CVE-2025-5862,1,1,0fa759fec7bd1c0efd0c0afd7a3a54fd5f8d485b772cb0df12745f419b3ed464,2025-06-09T05:15:21.887000