Auto-Update: 2025-07-07T06:00:12.317689+00:00

This commit is contained in:
cad-safe-bot 2025-07-07 06:03:48 +00:00
parent 2b48a33c89
commit 4959ea416e
9 changed files with 880 additions and 66 deletions

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-24508",
"sourceIdentifier": "secure@symantec.com",
"published": "2025-07-07T05:15:41.547",
"lastModified": "2025-07-07T05:15:41.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Extraction of Account Connectivity Credentials (ACCs) from the IT Management Agent secure storage"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@symantec.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35904",
"source": "secure@symantec.com"
}
]
}

View File

@ -0,0 +1,111 @@
{
"id": "CVE-2025-48501",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-07-07T05:15:41.913",
"lastModified": "2025-07-07T05:15:41.913",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "vultures@jpcert.or.jp",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An OS command injection issue exists in Nimesa Backup and Recovery v2.3 and v2.4. If this vulnerability is exploited, an arbitrary OS commands may be executed on the server where the product is running."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://aws.amazon.com/marketplace/seller-profile?id=08fb48d1-5d60-4feb-93c6-c0c219278a2c",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN88251376/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,111 @@
{
"id": "CVE-2025-53473",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-07-07T05:15:42.160",
"lastModified": "2025-07-07T05:15:42.160",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "vultures@jpcert.or.jp",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Server-side request forgery (SSRF) vulnerability exists n multiple versions of Nimesa Backup and Recovery, If this vulnerability is exploited, unintended requests may be sent to internal servers."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://aws.amazon.com/marketplace/seller-profile?id=08fb48d1-5d60-4feb-93c6-c0c219278a2c",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN88251376/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7110",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T04:15:31.707",
"lastModified": "2025-07-07T04:15:31.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Portabilis i-Educar 2.9.0. This affects an unknown part of the file /intranet/educar_escola_lst.php of the component School Module. The manipulation of the argument Escola leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README12.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315021",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315021",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.604802",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7111",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T05:15:42.367",
"lastModified": "2025-07-07T05:15:42.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README13.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315022",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315022",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.604822",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T05:15:42.607",
"lastModified": "2025-07-07T05:15:42.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Portabilis i-Educar 2.9.0 and classified as problematic. This issue affects some unknown processing of the file /intranet/educar_funcao_det.php?cod_funcao=COD&ref_cod_instituicao=COD of the component Function Management Module. The manipulation of the argument Fun\u00e7\u00e3o leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README14.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315023",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315023",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.604824",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7113",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T05:15:42.853",
"lastModified": "2025-07-07T05:15:42.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Portabilis i-Educar 2.9.0. It has been classified as problematic. Affected is an unknown function of the file /module/ComponenteCurricular/edit?id=ID of the component Curricular Components Module. The manipulation of the argument Nome leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README15.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315024",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315024",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.604879",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-07-07T04:00:12.353421+00:00
2025-07-07T06:00:12.317689+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-07-07T03:15:30.917000+00:00
2025-07-07T05:15:42.853000+00:00
```
### Last Data Feed Release
@ -33,49 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
300562
300569
```
### CVEs added in the last Commit
Recently added CVEs: `26`
Recently added CVEs: `7`
- [CVE-2025-53167](CVE-2025/CVE-2025-531xx/CVE-2025-53167.json) (`2025-07-07T03:15:27.433`)
- [CVE-2025-53168](CVE-2025/CVE-2025-531xx/CVE-2025-53168.json) (`2025-07-07T03:15:27.577`)
- [CVE-2025-53169](CVE-2025/CVE-2025-531xx/CVE-2025-53169.json) (`2025-07-07T03:15:27.720`)
- [CVE-2025-53170](CVE-2025/CVE-2025-531xx/CVE-2025-53170.json) (`2025-07-07T03:15:27.843`)
- [CVE-2025-53171](CVE-2025/CVE-2025-531xx/CVE-2025-53171.json) (`2025-07-07T03:15:27.990`)
- [CVE-2025-53172](CVE-2025/CVE-2025-531xx/CVE-2025-53172.json) (`2025-07-07T03:15:28.133`)
- [CVE-2025-53173](CVE-2025/CVE-2025-531xx/CVE-2025-53173.json) (`2025-07-07T03:15:28.283`)
- [CVE-2025-53174](CVE-2025/CVE-2025-531xx/CVE-2025-53174.json) (`2025-07-07T03:15:28.420`)
- [CVE-2025-53175](CVE-2025/CVE-2025-531xx/CVE-2025-53175.json) (`2025-07-07T03:15:28.567`)
- [CVE-2025-53176](CVE-2025/CVE-2025-531xx/CVE-2025-53176.json) (`2025-07-07T03:15:28.707`)
- [CVE-2025-53177](CVE-2025/CVE-2025-531xx/CVE-2025-53177.json) (`2025-07-07T03:15:28.847`)
- [CVE-2025-53178](CVE-2025/CVE-2025-531xx/CVE-2025-53178.json) (`2025-07-07T03:15:29.000`)
- [CVE-2025-53179](CVE-2025/CVE-2025-531xx/CVE-2025-53179.json) (`2025-07-07T03:15:29.140`)
- [CVE-2025-53180](CVE-2025/CVE-2025-531xx/CVE-2025-53180.json) (`2025-07-07T03:15:29.313`)
- [CVE-2025-53181](CVE-2025/CVE-2025-531xx/CVE-2025-53181.json) (`2025-07-07T03:15:29.480`)
- [CVE-2025-53182](CVE-2025/CVE-2025-531xx/CVE-2025-53182.json) (`2025-07-07T03:15:29.623`)
- [CVE-2025-53183](CVE-2025/CVE-2025-531xx/CVE-2025-53183.json) (`2025-07-07T03:15:29.770`)
- [CVE-2025-53184](CVE-2025/CVE-2025-531xx/CVE-2025-53184.json) (`2025-07-07T03:15:29.913`)
- [CVE-2025-53185](CVE-2025/CVE-2025-531xx/CVE-2025-53185.json) (`2025-07-07T03:15:30.063`)
- [CVE-2025-53186](CVE-2025/CVE-2025-531xx/CVE-2025-53186.json) (`2025-07-07T03:15:30.213`)
- [CVE-2025-7103](CVE-2025/CVE-2025-71xx/CVE-2025-7103.json) (`2025-07-07T02:15:20.693`)
- [CVE-2025-7107](CVE-2025/CVE-2025-71xx/CVE-2025-7107.json) (`2025-07-07T03:15:30.363`)
- [CVE-2025-7108](CVE-2025/CVE-2025-71xx/CVE-2025-7108.json) (`2025-07-07T03:15:30.547`)
- [CVE-2025-7109](CVE-2025/CVE-2025-71xx/CVE-2025-7109.json) (`2025-07-07T03:15:30.730`)
- [CVE-2025-7145](CVE-2025/CVE-2025-71xx/CVE-2025-7145.json) (`2025-07-07T03:15:30.917`)
- [CVE-2025-24508](CVE-2025/CVE-2025-245xx/CVE-2025-24508.json) (`2025-07-07T05:15:41.547`)
- [CVE-2025-48501](CVE-2025/CVE-2025-485xx/CVE-2025-48501.json) (`2025-07-07T05:15:41.913`)
- [CVE-2025-53473](CVE-2025/CVE-2025-534xx/CVE-2025-53473.json) (`2025-07-07T05:15:42.160`)
- [CVE-2025-7110](CVE-2025/CVE-2025-71xx/CVE-2025-7110.json) (`2025-07-07T04:15:31.707`)
- [CVE-2025-7111](CVE-2025/CVE-2025-71xx/CVE-2025-7111.json) (`2025-07-07T05:15:42.367`)
- [CVE-2025-7112](CVE-2025/CVE-2025-71xx/CVE-2025-7112.json) (`2025-07-07T05:15:42.607`)
- [CVE-2025-7113](CVE-2025/CVE-2025-71xx/CVE-2025-7113.json) (`2025-07-07T05:15:42.853`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `0`
- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-07-07T03:15:26.597`)
- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-07-07T03:15:26.790`)
- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-07-07T03:15:26.967`)
- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-07-07T03:15:27.130`)
- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-07-07T03:15:27.280`)
## Download and Usage

View File

@ -278882,7 +278882,7 @@ CVE-2024-58113,0,0,37d5efe126105105f509f811c1f66010427e6d8dfea43d5348f5a10e754f0
CVE-2024-58114,0,0,a7f585ce7dfbf0b97b3eee1b1073cb80827bf3d8e2069c0a57805f0a012fde61,2025-06-06T14:07:28.330000
CVE-2024-58115,0,0,8ee2d57aa555a84811a17c06b65aa39cf412a6df9d198ae25f7d44238b3b5ce0,2025-05-07T20:37:34.593000
CVE-2024-58116,0,0,f58b4e66b242172378a49c65b24c27c96f9911918be8c66bf34686462ff2d8ae,2025-05-07T20:37:53.310000
CVE-2024-58117,1,1,41764428368f56c7b99f7762d543ecd3fbf2a466e75ab423db317ddbc136f761,2025-07-07T03:15:26.393000
CVE-2024-58117,0,0,41764428368f56c7b99f7762d543ecd3fbf2a466e75ab423db317ddbc136f761,2025-07-07T03:15:26.393000
CVE-2024-5812,0,0,6925a842f54ea6dbd38d5338f4d1bba7949620aed85abec9f4ea1fe79df642ce,2025-02-11T21:36:43.423000
CVE-2024-58124,0,0,1a2a2660355db97deb2d7c523b62f02f98a2b0a075c4ca31839a01e7eeca01e8,2025-05-07T20:39:45.673000
CVE-2024-58125,0,0,b23e3756132f59e6e57532212ad97d2e40a2fc5dbfa3683944f098f7868f6b85,2025-05-07T20:41:10.753000
@ -288101,6 +288101,7 @@ CVE-2025-24504,0,0,ef6de3b3dbf1242190b08aac9e33b32e05b2dd27e51e53bc5474f7cffa0c6
CVE-2025-24505,0,0,7974460272478c3512102c93107009cbcaf39c532939b93286f6169dc2322ea0,2025-02-05T06:15:31.587000
CVE-2025-24506,0,0,6d0f2b92aeb54c0239442b80d645c7de8b9983e714f18d96e40f89a3734ac9c7,2025-02-05T06:15:31.737000
CVE-2025-24507,0,0,422b270ad7f0d60cc805efaa577ee203a8a40781b3fc9ddd5b1e3464f7401c91,2025-02-05T06:15:31.860000
CVE-2025-24508,1,1,fa5e5320e848c1e4b86e4c5f6ce8248a054c6c6ad04e10de3931103a3d7d2a18,2025-07-07T05:15:41.547000
CVE-2025-24510,0,0,f4346618569231171deeb91837ea19c4a3ebf78d3ab4044ab040e0d8c41ae8cc,2025-05-13T19:35:18.080000
CVE-2025-24513,0,0,5c5908095b7b8f59692c97894f2bc39950e9c619c5cca524158b823c48174aeb,2025-03-27T16:45:46.410000
CVE-2025-24514,0,0,1a64291b9861e3b81420eacf402909141500e0f7a383b259826850512f786e18,2025-03-27T16:45:46.410000
@ -297970,6 +297971,7 @@ CVE-2025-48494,0,0,0329dcb313613e53f258f49f9571ad3f690e1a097f931b0aba423ffd21693
CVE-2025-48495,0,0,231a0a2df8efd4f811988b128f1772192e88580d1043466f8b361c6491441d56,2025-06-02T17:32:17.397000
CVE-2025-48497,0,0,87864234e61d762b45107c5a61a3b1913d445c275f7eb7f6e202fd8227edee1b,2025-06-26T18:57:43.670000
CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000
CVE-2025-48501,1,1,2b57303455e9608f6b6f7e4d40c142e0e71a065cf9df20bb51ee33107d125d6f,2025-07-07T05:15:41.913000
CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000
CVE-2025-4852,0,0,9fdc9f5e4228d0479c129fbe9c7f799e549cc0e36b5c79452a30c2f45481eb4e,2025-06-04T20:10:34.490000
CVE-2025-4857,0,0,b8cd444e0175beca8d40133df431ce226233c6568d6b88387b6a31033e9026f6,2025-06-02T17:32:17.397000
@ -298245,13 +298247,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa
CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000
CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
CVE-2025-49175,0,1,9faf2b784099248b14e69e420f8174cf91f90c91136a6a61acef2a5ec596e701,2025-07-07T03:15:26.597000
CVE-2025-49176,0,1,698bba29619c0f520510fe4465ca1f7b708251319c2f7df0310d009893ca7fd6,2025-07-07T03:15:26.790000
CVE-2025-49175,0,0,9faf2b784099248b14e69e420f8174cf91f90c91136a6a61acef2a5ec596e701,2025-07-07T03:15:26.597000
CVE-2025-49176,0,0,698bba29619c0f520510fe4465ca1f7b708251319c2f7df0310d009893ca7fd6,2025-07-07T03:15:26.790000
CVE-2025-49177,0,0,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000
CVE-2025-49178,0,1,ddc70472b10eb8b1abebca055ef30167421a746a6d7b80a20053ba727451ba79,2025-07-07T03:15:26.967000
CVE-2025-49179,0,1,361252e3ae0af26da772053513921a7aedb918037ac03efd9323bccec2a9d865,2025-07-07T03:15:27.130000
CVE-2025-49178,0,0,ddc70472b10eb8b1abebca055ef30167421a746a6d7b80a20053ba727451ba79,2025-07-07T03:15:26.967000
CVE-2025-49179,0,0,361252e3ae0af26da772053513921a7aedb918037ac03efd9323bccec2a9d865,2025-07-07T03:15:27.130000
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
CVE-2025-49180,0,1,4764dccf60ba18880e48b0b772b6453204f32c86ccaef2910bb58b5412622fde,2025-07-07T03:15:27.280000
CVE-2025-49180,0,0,4764dccf60ba18880e48b0b772b6453204f32c86ccaef2910bb58b5412622fde,2025-07-07T03:15:27.280000
CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000
CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000
CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000
@ -299194,27 +299196,27 @@ CVE-2025-53163,0,0,7560bfbb1d4a318f63439c9ad14a4ee4c5e29027e65aabf45449f4c1d2064
CVE-2025-53164,0,0,1735ea93a314f58b5aca6d47f409e0ec1efb1092c3281e940e457ba7f02ca816,2025-06-27T04:15:55.077000
CVE-2025-53165,0,0,c18d3f0bac2527c4fc3c5949699939aade6fdfa1fc95f118b55a9226740ab740,2025-06-27T04:15:55.547000
CVE-2025-53166,0,0,009194b1e4d6b1b25c951d276d80052562e14b1709dfd02dd967ce379d64ab51,2025-06-27T04:15:55.620000
CVE-2025-53167,1,1,1937734cd16b07ca6c6bb5ee3354dff5421b0ebe365f12e74496b278bb03f2e4,2025-07-07T03:15:27.433000
CVE-2025-53168,1,1,cab6e8885db62effa659adbd77684a828e33d3b767750ef95c2e9c5de9a8c859,2025-07-07T03:15:27.577000
CVE-2025-53169,1,1,ae29f532cfcbf505850de5ef6b86257b17d9c617ebd0bd564cdb576a7e00e1c0,2025-07-07T03:15:27.720000
CVE-2025-53170,1,1,12c0fa5e61ccd9f1d3b447d72f3713699af5263eab763a344587a60fbdb817fa,2025-07-07T03:15:27.843000
CVE-2025-53171,1,1,74217308d7f5dead549093676595fbbbb97fd2c73c1c84309ff03f6074d4f19a,2025-07-07T03:15:27.990000
CVE-2025-53172,1,1,48bc9a7914ab14e230b31f0355c1be1d33fe11daad2336f543eb059b33850287,2025-07-07T03:15:28.133000
CVE-2025-53173,1,1,e0ad0340b41ecdbf81718d9c11e41e5b8323876778bd593836f6e5c57ea53843,2025-07-07T03:15:28.283000
CVE-2025-53174,1,1,e7c6ab4ed8f1d468e14968986fb7b7c08389addc3a01c8bf22992cb63c0af90b,2025-07-07T03:15:28.420000
CVE-2025-53175,1,1,7171bb1771966435e6f748b50466d8c8a3143400ffb549a8c67a44614f390616,2025-07-07T03:15:28.567000
CVE-2025-53176,1,1,3a078dcffc93fb0b820f7af49620f5e03dbbcd51111b4e32254e69f7f8278730,2025-07-07T03:15:28.707000
CVE-2025-53177,1,1,31e920bf484a47b709bfedb0cf32845f21256a906a4aa275186e8d567f3a2e9e,2025-07-07T03:15:28.847000
CVE-2025-53178,1,1,aa956bd79741dba36774ee93d35536756cf893c6ac5ca6510c95a3c47924a234,2025-07-07T03:15:29
CVE-2025-53179,1,1,ba9dff4d95a1e7ac53b2b3674e3495234e838cc82154be746ebfbb95c28908d9,2025-07-07T03:15:29.140000
CVE-2025-53167,0,0,1937734cd16b07ca6c6bb5ee3354dff5421b0ebe365f12e74496b278bb03f2e4,2025-07-07T03:15:27.433000
CVE-2025-53168,0,0,cab6e8885db62effa659adbd77684a828e33d3b767750ef95c2e9c5de9a8c859,2025-07-07T03:15:27.577000
CVE-2025-53169,0,0,ae29f532cfcbf505850de5ef6b86257b17d9c617ebd0bd564cdb576a7e00e1c0,2025-07-07T03:15:27.720000
CVE-2025-53170,0,0,12c0fa5e61ccd9f1d3b447d72f3713699af5263eab763a344587a60fbdb817fa,2025-07-07T03:15:27.843000
CVE-2025-53171,0,0,74217308d7f5dead549093676595fbbbb97fd2c73c1c84309ff03f6074d4f19a,2025-07-07T03:15:27.990000
CVE-2025-53172,0,0,48bc9a7914ab14e230b31f0355c1be1d33fe11daad2336f543eb059b33850287,2025-07-07T03:15:28.133000
CVE-2025-53173,0,0,e0ad0340b41ecdbf81718d9c11e41e5b8323876778bd593836f6e5c57ea53843,2025-07-07T03:15:28.283000
CVE-2025-53174,0,0,e7c6ab4ed8f1d468e14968986fb7b7c08389addc3a01c8bf22992cb63c0af90b,2025-07-07T03:15:28.420000
CVE-2025-53175,0,0,7171bb1771966435e6f748b50466d8c8a3143400ffb549a8c67a44614f390616,2025-07-07T03:15:28.567000
CVE-2025-53176,0,0,3a078dcffc93fb0b820f7af49620f5e03dbbcd51111b4e32254e69f7f8278730,2025-07-07T03:15:28.707000
CVE-2025-53177,0,0,31e920bf484a47b709bfedb0cf32845f21256a906a4aa275186e8d567f3a2e9e,2025-07-07T03:15:28.847000
CVE-2025-53178,0,0,aa956bd79741dba36774ee93d35536756cf893c6ac5ca6510c95a3c47924a234,2025-07-07T03:15:29
CVE-2025-53179,0,0,ba9dff4d95a1e7ac53b2b3674e3495234e838cc82154be746ebfbb95c28908d9,2025-07-07T03:15:29.140000
CVE-2025-5318,0,0,d95c49f8bb6d9b056310845ea915af91d8a36448ea3684ee98fec4064c982b12,2025-06-26T18:58:14.280000
CVE-2025-53180,1,1,ae36ba48d49459ca2e40899b6a412c69b417ef14f6a847671ba258739fe4f8dd,2025-07-07T03:15:29.313000
CVE-2025-53181,1,1,dcce960f567ec98c7f328b423eb1da97cb2798ad4052a23e304a4fd4b5643bab,2025-07-07T03:15:29.480000
CVE-2025-53182,1,1,333eafb582551210d2fe743df7e9d48734fd3acfcfe1e9a1eb0063290d7e1e05,2025-07-07T03:15:29.623000
CVE-2025-53183,1,1,be1e4b7bbef9664c50925e0fbeff32c89f5c402db0b2160e458add028a56e139,2025-07-07T03:15:29.770000
CVE-2025-53184,1,1,d4f42b161c4cee4c4efe574c31ad8684ed0a88e90d90263c7f216691fb1f4870,2025-07-07T03:15:29.913000
CVE-2025-53185,1,1,19cbe620ff0405b59896a2ed504269f6f376bdbfa3fc235882ea370399d7c5cc,2025-07-07T03:15:30.063000
CVE-2025-53186,1,1,296eb22370cb74e874c5294ffba351562529dce4d375f7ea3b8ba1df82dd1e24,2025-07-07T03:15:30.213000
CVE-2025-53180,0,0,ae36ba48d49459ca2e40899b6a412c69b417ef14f6a847671ba258739fe4f8dd,2025-07-07T03:15:29.313000
CVE-2025-53181,0,0,dcce960f567ec98c7f328b423eb1da97cb2798ad4052a23e304a4fd4b5643bab,2025-07-07T03:15:29.480000
CVE-2025-53182,0,0,333eafb582551210d2fe743df7e9d48734fd3acfcfe1e9a1eb0063290d7e1e05,2025-07-07T03:15:29.623000
CVE-2025-53183,0,0,be1e4b7bbef9664c50925e0fbeff32c89f5c402db0b2160e458add028a56e139,2025-07-07T03:15:29.770000
CVE-2025-53184,0,0,d4f42b161c4cee4c4efe574c31ad8684ed0a88e90d90263c7f216691fb1f4870,2025-07-07T03:15:29.913000
CVE-2025-53185,0,0,19cbe620ff0405b59896a2ed504269f6f376bdbfa3fc235882ea370399d7c5cc,2025-07-07T03:15:30.063000
CVE-2025-53186,0,0,296eb22370cb74e874c5294ffba351562529dce4d375f7ea3b8ba1df82dd1e24,2025-07-07T03:15:30.213000
CVE-2025-53193,0,0,e8a1858afec756a866470e301b23ba5163a056600bc99be908895db6b5b13715,2025-06-30T18:38:48.477000
CVE-2025-53197,0,0,c72c4fa2068296a945121bdae25a00c4e4b5bc2b6a4d9dec211949fd42ccb988,2025-06-30T18:38:48.477000
CVE-2025-53199,0,0,0b13aa3fda3336c0253b39c836eef41f1f08653d0ef3393db99526fff842874f,2025-06-30T18:38:48.477000
@ -299334,6 +299336,7 @@ CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2c
CVE-2025-5341,0,0,310ade0fef4f00a2bb774631c0600d07f23bdfc4eb7718128328a35e4c244522,2025-06-05T20:12:23.777000
CVE-2025-53415,0,0,a69e8e91492110c4dbcf675778ea91b79a25d896361aa62120c18b659d9f38c5,2025-07-01T08:15:24.610000
CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29ac92,2025-06-30T10:15:26.127000
CVE-2025-53473,1,1,92e0083ee269eb4212926b3287cc39d3ed6a29cce1276085559cc4c84fae9d14,2025-07-07T05:15:42.160000
CVE-2025-53481,0,0,1c051551cffe76b0d474f6e015c338541c0bfd354ef6be284333e122485d826c,2025-07-04T16:15:22.167000
CVE-2025-53482,0,0,5eba40710e02310ba1ecb93085ddc4dc0cc4fa5b62b8ed248a2bb7696c4ab7d3,2025-07-04T16:15:22.320000
CVE-2025-53483,0,0,b9bb55989c3fd3c1cf55d058e4583af35124f2974234424179c7e6a11dd9be9f,2025-07-04T18:15:22.790000
@ -300556,8 +300559,12 @@ CVE-2025-7099,0,0,87949c56d00cec79cc0373a58db47ba591b2b1b501b545e23abf830cf698df
CVE-2025-7100,0,0,e92939847949ee02dfeb59c915a785450288e223e3f32d0325d95d239ca36e74,2025-07-07T01:15:22.633000
CVE-2025-7101,0,0,d395c3a0fc266fc49eb8cb7fe978a666e991ac39206772e4636794ddb43c8622,2025-07-07T01:15:23.450000
CVE-2025-7102,0,0,dfff2f2f909d1d154a7f5b441a81cf174af9c1013ee6f30af2214c4e00eef044,2025-07-07T01:15:23.637000
CVE-2025-7103,1,1,716bef8449b79d925583831231c07737d0af573cded30f031312863d99dc6e75,2025-07-07T02:15:20.693000
CVE-2025-7107,1,1,a51dbc17f4d6b944bf3a2b33208d299fccd4801af400b67262c21925ba56cadd,2025-07-07T03:15:30.363000
CVE-2025-7108,1,1,353e8beef98a86d7bfdff1615dfedaa981808297131fa9f6ea783c47e8f130ff,2025-07-07T03:15:30.547000
CVE-2025-7109,1,1,5a0461fe092f685ba4d419f22522908f148069f52e91c15895d5bd37eef750d8,2025-07-07T03:15:30.730000
CVE-2025-7145,1,1,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000
CVE-2025-7103,0,0,716bef8449b79d925583831231c07737d0af573cded30f031312863d99dc6e75,2025-07-07T02:15:20.693000
CVE-2025-7107,0,0,a51dbc17f4d6b944bf3a2b33208d299fccd4801af400b67262c21925ba56cadd,2025-07-07T03:15:30.363000
CVE-2025-7108,0,0,353e8beef98a86d7bfdff1615dfedaa981808297131fa9f6ea783c47e8f130ff,2025-07-07T03:15:30.547000
CVE-2025-7109,0,0,5a0461fe092f685ba4d419f22522908f148069f52e91c15895d5bd37eef750d8,2025-07-07T03:15:30.730000
CVE-2025-7110,1,1,78e84cd184214c8de0a1ada602f4b00187384264313ccdbcb09a6e1337e3d331,2025-07-07T04:15:31.707000
CVE-2025-7111,1,1,0bb458236d4f2833e2afc9ee2a0409849ac32b5fc5d42632aa727ab512e0958a,2025-07-07T05:15:42.367000
CVE-2025-7112,1,1,c72213c346cc2670b45f717f2184ee8ba3c7c3d3c0c85dd55deb4c8343ae0400,2025-07-07T05:15:42.607000
CVE-2025-7113,1,1,378c791a391810b24ec13a0a39c0ddad93df0fc0fc96459e7c5a0fbfb93a18f9,2025-07-07T05:15:42.853000
CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000

Can't render this file because it is too large.