From 4959ea416e141d36c18b93fe2b625ac68fa8489d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 7 Jul 2025 06:03:48 +0000 Subject: [PATCH] Auto-Update: 2025-07-07T06:00:12.317689+00:00 --- CVE-2025/CVE-2025-245xx/CVE-2025-24508.json | 44 ++++++ CVE-2025/CVE-2025-485xx/CVE-2025-48501.json | 111 +++++++++++++++ CVE-2025/CVE-2025-534xx/CVE-2025-53473.json | 111 +++++++++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7110.json | 141 ++++++++++++++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7111.json | 141 ++++++++++++++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7112.json | 141 ++++++++++++++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7113.json | 141 ++++++++++++++++++++ README.md | 47 ++----- _state.csv | 69 +++++----- 9 files changed, 880 insertions(+), 66 deletions(-) create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24508.json create mode 100644 CVE-2025/CVE-2025-485xx/CVE-2025-48501.json create mode 100644 CVE-2025/CVE-2025-534xx/CVE-2025-53473.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7110.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7111.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7112.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7113.json diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24508.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24508.json new file mode 100644 index 00000000000..06ced1c96b1 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24508.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-24508", + "sourceIdentifier": "secure@symantec.com", + "published": "2025-07-07T05:15:41.547", + "lastModified": "2025-07-07T05:15:41.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Extraction of Account Connectivity Credentials (ACCs) from the IT Management Agent secure storage" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@symantec.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35904", + "source": "secure@symantec.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-485xx/CVE-2025-48501.json b/CVE-2025/CVE-2025-485xx/CVE-2025-48501.json new file mode 100644 index 00000000000..4d2f2ab5b19 --- /dev/null +++ b/CVE-2025/CVE-2025-485xx/CVE-2025-48501.json @@ -0,0 +1,111 @@ +{ + "id": "CVE-2025-48501", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-07-07T05:15:41.913", + "lastModified": "2025-07-07T05:15:41.913", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "vultures@jpcert.or.jp", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection issue exists in Nimesa Backup and Recovery v2.3 and v2.4. If this vulnerability is exploited, an arbitrary OS commands may be executed on the server where the product is running." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://aws.amazon.com/marketplace/seller-profile?id=08fb48d1-5d60-4feb-93c6-c0c219278a2c", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN88251376/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-534xx/CVE-2025-53473.json b/CVE-2025/CVE-2025-534xx/CVE-2025-53473.json new file mode 100644 index 00000000000..c815fa86a81 --- /dev/null +++ b/CVE-2025/CVE-2025-534xx/CVE-2025-53473.json @@ -0,0 +1,111 @@ +{ + "id": "CVE-2025-53473", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2025-07-07T05:15:42.160", + "lastModified": "2025-07-07T05:15:42.160", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "vultures@jpcert.or.jp", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Server-side request forgery (SSRF) vulnerability exists n multiple versions of Nimesa Backup and Recovery, If this vulnerability is exploited, unintended requests may be sent to internal servers." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV30": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "vultures@jpcert.or.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://aws.amazon.com/marketplace/seller-profile?id=08fb48d1-5d60-4feb-93c6-c0c219278a2c", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN88251376/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7110.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7110.json new file mode 100644 index 00000000000..521366e9d50 --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7110.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-7110", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-07T04:15:31.707", + "lastModified": "2025-07-07T04:15:31.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in Portabilis i-Educar 2.9.0. This affects an unknown part of the file /intranet/educar_escola_lst.php of the component School Module. The manipulation of the argument Escola leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README12.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315021", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315021", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.604802", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7111.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7111.json new file mode 100644 index 00000000000..c13363cb32f --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7111.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-7111", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-07T05:15:42.367", + "lastModified": "2025-07-07T05:15:42.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README13.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315022", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315022", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.604822", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7112.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7112.json new file mode 100644 index 00000000000..4733de7838e --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7112.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-7112", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-07T05:15:42.607", + "lastModified": "2025-07-07T05:15:42.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Portabilis i-Educar 2.9.0 and classified as problematic. This issue affects some unknown processing of the file /intranet/educar_funcao_det.php?cod_funcao=COD&ref_cod_instituicao=COD of the component Function Management Module. The manipulation of the argument Fun\u00e7\u00e3o leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README14.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315023", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315023", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.604824", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7113.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7113.json new file mode 100644 index 00000000000..3989ac6823c --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7113.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-7113", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-07T05:15:42.853", + "lastModified": "2025-07-07T05:15:42.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Portabilis i-Educar 2.9.0. It has been classified as problematic. Affected is an unknown function of the file /module/ComponenteCurricular/edit?id=ID of the component Curricular Components Module. The manipulation of the argument Nome leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README15.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315024", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315024", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.604879", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 8162aa1c1e6..46099834f90 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-07-07T04:00:12.353421+00:00 +2025-07-07T06:00:12.317689+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-07-07T03:15:30.917000+00:00 +2025-07-07T05:15:42.853000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -300562 +300569 ``` ### CVEs added in the last Commit -Recently added CVEs: `26` +Recently added CVEs: `7` -- [CVE-2025-53167](CVE-2025/CVE-2025-531xx/CVE-2025-53167.json) (`2025-07-07T03:15:27.433`) -- [CVE-2025-53168](CVE-2025/CVE-2025-531xx/CVE-2025-53168.json) (`2025-07-07T03:15:27.577`) -- [CVE-2025-53169](CVE-2025/CVE-2025-531xx/CVE-2025-53169.json) (`2025-07-07T03:15:27.720`) -- [CVE-2025-53170](CVE-2025/CVE-2025-531xx/CVE-2025-53170.json) (`2025-07-07T03:15:27.843`) -- [CVE-2025-53171](CVE-2025/CVE-2025-531xx/CVE-2025-53171.json) (`2025-07-07T03:15:27.990`) -- [CVE-2025-53172](CVE-2025/CVE-2025-531xx/CVE-2025-53172.json) (`2025-07-07T03:15:28.133`) -- [CVE-2025-53173](CVE-2025/CVE-2025-531xx/CVE-2025-53173.json) (`2025-07-07T03:15:28.283`) -- [CVE-2025-53174](CVE-2025/CVE-2025-531xx/CVE-2025-53174.json) (`2025-07-07T03:15:28.420`) -- [CVE-2025-53175](CVE-2025/CVE-2025-531xx/CVE-2025-53175.json) (`2025-07-07T03:15:28.567`) -- [CVE-2025-53176](CVE-2025/CVE-2025-531xx/CVE-2025-53176.json) (`2025-07-07T03:15:28.707`) -- [CVE-2025-53177](CVE-2025/CVE-2025-531xx/CVE-2025-53177.json) (`2025-07-07T03:15:28.847`) -- [CVE-2025-53178](CVE-2025/CVE-2025-531xx/CVE-2025-53178.json) (`2025-07-07T03:15:29.000`) -- [CVE-2025-53179](CVE-2025/CVE-2025-531xx/CVE-2025-53179.json) (`2025-07-07T03:15:29.140`) -- [CVE-2025-53180](CVE-2025/CVE-2025-531xx/CVE-2025-53180.json) (`2025-07-07T03:15:29.313`) -- [CVE-2025-53181](CVE-2025/CVE-2025-531xx/CVE-2025-53181.json) (`2025-07-07T03:15:29.480`) -- [CVE-2025-53182](CVE-2025/CVE-2025-531xx/CVE-2025-53182.json) (`2025-07-07T03:15:29.623`) -- [CVE-2025-53183](CVE-2025/CVE-2025-531xx/CVE-2025-53183.json) (`2025-07-07T03:15:29.770`) -- [CVE-2025-53184](CVE-2025/CVE-2025-531xx/CVE-2025-53184.json) (`2025-07-07T03:15:29.913`) -- [CVE-2025-53185](CVE-2025/CVE-2025-531xx/CVE-2025-53185.json) (`2025-07-07T03:15:30.063`) -- [CVE-2025-53186](CVE-2025/CVE-2025-531xx/CVE-2025-53186.json) (`2025-07-07T03:15:30.213`) -- [CVE-2025-7103](CVE-2025/CVE-2025-71xx/CVE-2025-7103.json) (`2025-07-07T02:15:20.693`) -- [CVE-2025-7107](CVE-2025/CVE-2025-71xx/CVE-2025-7107.json) (`2025-07-07T03:15:30.363`) -- [CVE-2025-7108](CVE-2025/CVE-2025-71xx/CVE-2025-7108.json) (`2025-07-07T03:15:30.547`) -- [CVE-2025-7109](CVE-2025/CVE-2025-71xx/CVE-2025-7109.json) (`2025-07-07T03:15:30.730`) -- [CVE-2025-7145](CVE-2025/CVE-2025-71xx/CVE-2025-7145.json) (`2025-07-07T03:15:30.917`) +- [CVE-2025-24508](CVE-2025/CVE-2025-245xx/CVE-2025-24508.json) (`2025-07-07T05:15:41.547`) +- [CVE-2025-48501](CVE-2025/CVE-2025-485xx/CVE-2025-48501.json) (`2025-07-07T05:15:41.913`) +- [CVE-2025-53473](CVE-2025/CVE-2025-534xx/CVE-2025-53473.json) (`2025-07-07T05:15:42.160`) +- [CVE-2025-7110](CVE-2025/CVE-2025-71xx/CVE-2025-7110.json) (`2025-07-07T04:15:31.707`) +- [CVE-2025-7111](CVE-2025/CVE-2025-71xx/CVE-2025-7111.json) (`2025-07-07T05:15:42.367`) +- [CVE-2025-7112](CVE-2025/CVE-2025-71xx/CVE-2025-7112.json) (`2025-07-07T05:15:42.607`) +- [CVE-2025-7113](CVE-2025/CVE-2025-71xx/CVE-2025-7113.json) (`2025-07-07T05:15:42.853`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `0` -- [CVE-2025-49175](CVE-2025/CVE-2025-491xx/CVE-2025-49175.json) (`2025-07-07T03:15:26.597`) -- [CVE-2025-49176](CVE-2025/CVE-2025-491xx/CVE-2025-49176.json) (`2025-07-07T03:15:26.790`) -- [CVE-2025-49178](CVE-2025/CVE-2025-491xx/CVE-2025-49178.json) (`2025-07-07T03:15:26.967`) -- [CVE-2025-49179](CVE-2025/CVE-2025-491xx/CVE-2025-49179.json) (`2025-07-07T03:15:27.130`) -- [CVE-2025-49180](CVE-2025/CVE-2025-491xx/CVE-2025-49180.json) (`2025-07-07T03:15:27.280`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d31d85fb509..a666cf0257c 100644 --- a/_state.csv +++ b/_state.csv @@ -278882,7 +278882,7 @@ CVE-2024-58113,0,0,37d5efe126105105f509f811c1f66010427e6d8dfea43d5348f5a10e754f0 CVE-2024-58114,0,0,a7f585ce7dfbf0b97b3eee1b1073cb80827bf3d8e2069c0a57805f0a012fde61,2025-06-06T14:07:28.330000 CVE-2024-58115,0,0,8ee2d57aa555a84811a17c06b65aa39cf412a6df9d198ae25f7d44238b3b5ce0,2025-05-07T20:37:34.593000 CVE-2024-58116,0,0,f58b4e66b242172378a49c65b24c27c96f9911918be8c66bf34686462ff2d8ae,2025-05-07T20:37:53.310000 -CVE-2024-58117,1,1,41764428368f56c7b99f7762d543ecd3fbf2a466e75ab423db317ddbc136f761,2025-07-07T03:15:26.393000 +CVE-2024-58117,0,0,41764428368f56c7b99f7762d543ecd3fbf2a466e75ab423db317ddbc136f761,2025-07-07T03:15:26.393000 CVE-2024-5812,0,0,6925a842f54ea6dbd38d5338f4d1bba7949620aed85abec9f4ea1fe79df642ce,2025-02-11T21:36:43.423000 CVE-2024-58124,0,0,1a2a2660355db97deb2d7c523b62f02f98a2b0a075c4ca31839a01e7eeca01e8,2025-05-07T20:39:45.673000 CVE-2024-58125,0,0,b23e3756132f59e6e57532212ad97d2e40a2fc5dbfa3683944f098f7868f6b85,2025-05-07T20:41:10.753000 @@ -288101,6 +288101,7 @@ CVE-2025-24504,0,0,ef6de3b3dbf1242190b08aac9e33b32e05b2dd27e51e53bc5474f7cffa0c6 CVE-2025-24505,0,0,7974460272478c3512102c93107009cbcaf39c532939b93286f6169dc2322ea0,2025-02-05T06:15:31.587000 CVE-2025-24506,0,0,6d0f2b92aeb54c0239442b80d645c7de8b9983e714f18d96e40f89a3734ac9c7,2025-02-05T06:15:31.737000 CVE-2025-24507,0,0,422b270ad7f0d60cc805efaa577ee203a8a40781b3fc9ddd5b1e3464f7401c91,2025-02-05T06:15:31.860000 +CVE-2025-24508,1,1,fa5e5320e848c1e4b86e4c5f6ce8248a054c6c6ad04e10de3931103a3d7d2a18,2025-07-07T05:15:41.547000 CVE-2025-24510,0,0,f4346618569231171deeb91837ea19c4a3ebf78d3ab4044ab040e0d8c41ae8cc,2025-05-13T19:35:18.080000 CVE-2025-24513,0,0,5c5908095b7b8f59692c97894f2bc39950e9c619c5cca524158b823c48174aeb,2025-03-27T16:45:46.410000 CVE-2025-24514,0,0,1a64291b9861e3b81420eacf402909141500e0f7a383b259826850512f786e18,2025-03-27T16:45:46.410000 @@ -297970,6 +297971,7 @@ CVE-2025-48494,0,0,0329dcb313613e53f258f49f9571ad3f690e1a097f931b0aba423ffd21693 CVE-2025-48495,0,0,231a0a2df8efd4f811988b128f1772192e88580d1043466f8b361c6491441d56,2025-06-02T17:32:17.397000 CVE-2025-48497,0,0,87864234e61d762b45107c5a61a3b1913d445c275f7eb7f6e202fd8227edee1b,2025-06-26T18:57:43.670000 CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000 +CVE-2025-48501,1,1,2b57303455e9608f6b6f7e4d40c142e0e71a065cf9df20bb51ee33107d125d6f,2025-07-07T05:15:41.913000 CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000 CVE-2025-4852,0,0,9fdc9f5e4228d0479c129fbe9c7f799e549cc0e36b5c79452a30c2f45481eb4e,2025-06-04T20:10:34.490000 CVE-2025-4857,0,0,b8cd444e0175beca8d40133df431ce226233c6568d6b88387b6a31033e9026f6,2025-06-02T17:32:17.397000 @@ -298245,13 +298247,13 @@ CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa CVE-2025-49163,0,0,643a72915169b3c81852832f164c7ce28984b32bf8cbac1ededba1c30e43e026,2025-06-04T14:54:33.783000 CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304934,2025-06-04T14:54:33.783000 CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000 -CVE-2025-49175,0,1,9faf2b784099248b14e69e420f8174cf91f90c91136a6a61acef2a5ec596e701,2025-07-07T03:15:26.597000 -CVE-2025-49176,0,1,698bba29619c0f520510fe4465ca1f7b708251319c2f7df0310d009893ca7fd6,2025-07-07T03:15:26.790000 +CVE-2025-49175,0,0,9faf2b784099248b14e69e420f8174cf91f90c91136a6a61acef2a5ec596e701,2025-07-07T03:15:26.597000 +CVE-2025-49176,0,0,698bba29619c0f520510fe4465ca1f7b708251319c2f7df0310d009893ca7fd6,2025-07-07T03:15:26.790000 CVE-2025-49177,0,0,2776354ba86cd7216ed2eee07d464dd343e2260aa14001f109fcd75b0e6568d1,2025-07-02T20:15:30.943000 -CVE-2025-49178,0,1,ddc70472b10eb8b1abebca055ef30167421a746a6d7b80a20053ba727451ba79,2025-07-07T03:15:26.967000 -CVE-2025-49179,0,1,361252e3ae0af26da772053513921a7aedb918037ac03efd9323bccec2a9d865,2025-07-07T03:15:27.130000 +CVE-2025-49178,0,0,ddc70472b10eb8b1abebca055ef30167421a746a6d7b80a20053ba727451ba79,2025-07-07T03:15:26.967000 +CVE-2025-49179,0,0,361252e3ae0af26da772053513921a7aedb918037ac03efd9323bccec2a9d865,2025-07-07T03:15:27.130000 CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000 -CVE-2025-49180,0,1,4764dccf60ba18880e48b0b772b6453204f32c86ccaef2910bb58b5412622fde,2025-07-07T03:15:27.280000 +CVE-2025-49180,0,0,4764dccf60ba18880e48b0b772b6453204f32c86ccaef2910bb58b5412622fde,2025-07-07T03:15:27.280000 CVE-2025-49181,0,0,65f8ea01de63d019d8688de775c40b302b8c0b1e44c040e53e46324e69435218,2025-06-12T16:06:20.180000 CVE-2025-49182,0,0,8adc8833944dbbffb6c925bafc811eee2574582f2d7b7b09537e334080770141,2025-06-13T09:15:20.130000 CVE-2025-49183,0,0,c9c3ab65e477d8e9a4d5c9adaf45822d49f0873835d0971680386eb894e72562,2025-06-12T16:06:20.180000 @@ -299194,27 +299196,27 @@ CVE-2025-53163,0,0,7560bfbb1d4a318f63439c9ad14a4ee4c5e29027e65aabf45449f4c1d2064 CVE-2025-53164,0,0,1735ea93a314f58b5aca6d47f409e0ec1efb1092c3281e940e457ba7f02ca816,2025-06-27T04:15:55.077000 CVE-2025-53165,0,0,c18d3f0bac2527c4fc3c5949699939aade6fdfa1fc95f118b55a9226740ab740,2025-06-27T04:15:55.547000 CVE-2025-53166,0,0,009194b1e4d6b1b25c951d276d80052562e14b1709dfd02dd967ce379d64ab51,2025-06-27T04:15:55.620000 -CVE-2025-53167,1,1,1937734cd16b07ca6c6bb5ee3354dff5421b0ebe365f12e74496b278bb03f2e4,2025-07-07T03:15:27.433000 -CVE-2025-53168,1,1,cab6e8885db62effa659adbd77684a828e33d3b767750ef95c2e9c5de9a8c859,2025-07-07T03:15:27.577000 -CVE-2025-53169,1,1,ae29f532cfcbf505850de5ef6b86257b17d9c617ebd0bd564cdb576a7e00e1c0,2025-07-07T03:15:27.720000 -CVE-2025-53170,1,1,12c0fa5e61ccd9f1d3b447d72f3713699af5263eab763a344587a60fbdb817fa,2025-07-07T03:15:27.843000 -CVE-2025-53171,1,1,74217308d7f5dead549093676595fbbbb97fd2c73c1c84309ff03f6074d4f19a,2025-07-07T03:15:27.990000 -CVE-2025-53172,1,1,48bc9a7914ab14e230b31f0355c1be1d33fe11daad2336f543eb059b33850287,2025-07-07T03:15:28.133000 -CVE-2025-53173,1,1,e0ad0340b41ecdbf81718d9c11e41e5b8323876778bd593836f6e5c57ea53843,2025-07-07T03:15:28.283000 -CVE-2025-53174,1,1,e7c6ab4ed8f1d468e14968986fb7b7c08389addc3a01c8bf22992cb63c0af90b,2025-07-07T03:15:28.420000 -CVE-2025-53175,1,1,7171bb1771966435e6f748b50466d8c8a3143400ffb549a8c67a44614f390616,2025-07-07T03:15:28.567000 -CVE-2025-53176,1,1,3a078dcffc93fb0b820f7af49620f5e03dbbcd51111b4e32254e69f7f8278730,2025-07-07T03:15:28.707000 -CVE-2025-53177,1,1,31e920bf484a47b709bfedb0cf32845f21256a906a4aa275186e8d567f3a2e9e,2025-07-07T03:15:28.847000 -CVE-2025-53178,1,1,aa956bd79741dba36774ee93d35536756cf893c6ac5ca6510c95a3c47924a234,2025-07-07T03:15:29 -CVE-2025-53179,1,1,ba9dff4d95a1e7ac53b2b3674e3495234e838cc82154be746ebfbb95c28908d9,2025-07-07T03:15:29.140000 +CVE-2025-53167,0,0,1937734cd16b07ca6c6bb5ee3354dff5421b0ebe365f12e74496b278bb03f2e4,2025-07-07T03:15:27.433000 +CVE-2025-53168,0,0,cab6e8885db62effa659adbd77684a828e33d3b767750ef95c2e9c5de9a8c859,2025-07-07T03:15:27.577000 +CVE-2025-53169,0,0,ae29f532cfcbf505850de5ef6b86257b17d9c617ebd0bd564cdb576a7e00e1c0,2025-07-07T03:15:27.720000 +CVE-2025-53170,0,0,12c0fa5e61ccd9f1d3b447d72f3713699af5263eab763a344587a60fbdb817fa,2025-07-07T03:15:27.843000 +CVE-2025-53171,0,0,74217308d7f5dead549093676595fbbbb97fd2c73c1c84309ff03f6074d4f19a,2025-07-07T03:15:27.990000 +CVE-2025-53172,0,0,48bc9a7914ab14e230b31f0355c1be1d33fe11daad2336f543eb059b33850287,2025-07-07T03:15:28.133000 +CVE-2025-53173,0,0,e0ad0340b41ecdbf81718d9c11e41e5b8323876778bd593836f6e5c57ea53843,2025-07-07T03:15:28.283000 +CVE-2025-53174,0,0,e7c6ab4ed8f1d468e14968986fb7b7c08389addc3a01c8bf22992cb63c0af90b,2025-07-07T03:15:28.420000 +CVE-2025-53175,0,0,7171bb1771966435e6f748b50466d8c8a3143400ffb549a8c67a44614f390616,2025-07-07T03:15:28.567000 +CVE-2025-53176,0,0,3a078dcffc93fb0b820f7af49620f5e03dbbcd51111b4e32254e69f7f8278730,2025-07-07T03:15:28.707000 +CVE-2025-53177,0,0,31e920bf484a47b709bfedb0cf32845f21256a906a4aa275186e8d567f3a2e9e,2025-07-07T03:15:28.847000 +CVE-2025-53178,0,0,aa956bd79741dba36774ee93d35536756cf893c6ac5ca6510c95a3c47924a234,2025-07-07T03:15:29 +CVE-2025-53179,0,0,ba9dff4d95a1e7ac53b2b3674e3495234e838cc82154be746ebfbb95c28908d9,2025-07-07T03:15:29.140000 CVE-2025-5318,0,0,d95c49f8bb6d9b056310845ea915af91d8a36448ea3684ee98fec4064c982b12,2025-06-26T18:58:14.280000 -CVE-2025-53180,1,1,ae36ba48d49459ca2e40899b6a412c69b417ef14f6a847671ba258739fe4f8dd,2025-07-07T03:15:29.313000 -CVE-2025-53181,1,1,dcce960f567ec98c7f328b423eb1da97cb2798ad4052a23e304a4fd4b5643bab,2025-07-07T03:15:29.480000 -CVE-2025-53182,1,1,333eafb582551210d2fe743df7e9d48734fd3acfcfe1e9a1eb0063290d7e1e05,2025-07-07T03:15:29.623000 -CVE-2025-53183,1,1,be1e4b7bbef9664c50925e0fbeff32c89f5c402db0b2160e458add028a56e139,2025-07-07T03:15:29.770000 -CVE-2025-53184,1,1,d4f42b161c4cee4c4efe574c31ad8684ed0a88e90d90263c7f216691fb1f4870,2025-07-07T03:15:29.913000 -CVE-2025-53185,1,1,19cbe620ff0405b59896a2ed504269f6f376bdbfa3fc235882ea370399d7c5cc,2025-07-07T03:15:30.063000 -CVE-2025-53186,1,1,296eb22370cb74e874c5294ffba351562529dce4d375f7ea3b8ba1df82dd1e24,2025-07-07T03:15:30.213000 +CVE-2025-53180,0,0,ae36ba48d49459ca2e40899b6a412c69b417ef14f6a847671ba258739fe4f8dd,2025-07-07T03:15:29.313000 +CVE-2025-53181,0,0,dcce960f567ec98c7f328b423eb1da97cb2798ad4052a23e304a4fd4b5643bab,2025-07-07T03:15:29.480000 +CVE-2025-53182,0,0,333eafb582551210d2fe743df7e9d48734fd3acfcfe1e9a1eb0063290d7e1e05,2025-07-07T03:15:29.623000 +CVE-2025-53183,0,0,be1e4b7bbef9664c50925e0fbeff32c89f5c402db0b2160e458add028a56e139,2025-07-07T03:15:29.770000 +CVE-2025-53184,0,0,d4f42b161c4cee4c4efe574c31ad8684ed0a88e90d90263c7f216691fb1f4870,2025-07-07T03:15:29.913000 +CVE-2025-53185,0,0,19cbe620ff0405b59896a2ed504269f6f376bdbfa3fc235882ea370399d7c5cc,2025-07-07T03:15:30.063000 +CVE-2025-53186,0,0,296eb22370cb74e874c5294ffba351562529dce4d375f7ea3b8ba1df82dd1e24,2025-07-07T03:15:30.213000 CVE-2025-53193,0,0,e8a1858afec756a866470e301b23ba5163a056600bc99be908895db6b5b13715,2025-06-30T18:38:48.477000 CVE-2025-53197,0,0,c72c4fa2068296a945121bdae25a00c4e4b5bc2b6a4d9dec211949fd42ccb988,2025-06-30T18:38:48.477000 CVE-2025-53199,0,0,0b13aa3fda3336c0253b39c836eef41f1f08653d0ef3393db99526fff842874f,2025-06-30T18:38:48.477000 @@ -299334,6 +299336,7 @@ CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2c CVE-2025-5341,0,0,310ade0fef4f00a2bb774631c0600d07f23bdfc4eb7718128328a35e4c244522,2025-06-05T20:12:23.777000 CVE-2025-53415,0,0,a69e8e91492110c4dbcf675778ea91b79a25d896361aa62120c18b659d9f38c5,2025-07-01T08:15:24.610000 CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29ac92,2025-06-30T10:15:26.127000 +CVE-2025-53473,1,1,92e0083ee269eb4212926b3287cc39d3ed6a29cce1276085559cc4c84fae9d14,2025-07-07T05:15:42.160000 CVE-2025-53481,0,0,1c051551cffe76b0d474f6e015c338541c0bfd354ef6be284333e122485d826c,2025-07-04T16:15:22.167000 CVE-2025-53482,0,0,5eba40710e02310ba1ecb93085ddc4dc0cc4fa5b62b8ed248a2bb7696c4ab7d3,2025-07-04T16:15:22.320000 CVE-2025-53483,0,0,b9bb55989c3fd3c1cf55d058e4583af35124f2974234424179c7e6a11dd9be9f,2025-07-04T18:15:22.790000 @@ -300556,8 +300559,12 @@ CVE-2025-7099,0,0,87949c56d00cec79cc0373a58db47ba591b2b1b501b545e23abf830cf698df CVE-2025-7100,0,0,e92939847949ee02dfeb59c915a785450288e223e3f32d0325d95d239ca36e74,2025-07-07T01:15:22.633000 CVE-2025-7101,0,0,d395c3a0fc266fc49eb8cb7fe978a666e991ac39206772e4636794ddb43c8622,2025-07-07T01:15:23.450000 CVE-2025-7102,0,0,dfff2f2f909d1d154a7f5b441a81cf174af9c1013ee6f30af2214c4e00eef044,2025-07-07T01:15:23.637000 -CVE-2025-7103,1,1,716bef8449b79d925583831231c07737d0af573cded30f031312863d99dc6e75,2025-07-07T02:15:20.693000 -CVE-2025-7107,1,1,a51dbc17f4d6b944bf3a2b33208d299fccd4801af400b67262c21925ba56cadd,2025-07-07T03:15:30.363000 -CVE-2025-7108,1,1,353e8beef98a86d7bfdff1615dfedaa981808297131fa9f6ea783c47e8f130ff,2025-07-07T03:15:30.547000 -CVE-2025-7109,1,1,5a0461fe092f685ba4d419f22522908f148069f52e91c15895d5bd37eef750d8,2025-07-07T03:15:30.730000 -CVE-2025-7145,1,1,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000 +CVE-2025-7103,0,0,716bef8449b79d925583831231c07737d0af573cded30f031312863d99dc6e75,2025-07-07T02:15:20.693000 +CVE-2025-7107,0,0,a51dbc17f4d6b944bf3a2b33208d299fccd4801af400b67262c21925ba56cadd,2025-07-07T03:15:30.363000 +CVE-2025-7108,0,0,353e8beef98a86d7bfdff1615dfedaa981808297131fa9f6ea783c47e8f130ff,2025-07-07T03:15:30.547000 +CVE-2025-7109,0,0,5a0461fe092f685ba4d419f22522908f148069f52e91c15895d5bd37eef750d8,2025-07-07T03:15:30.730000 +CVE-2025-7110,1,1,78e84cd184214c8de0a1ada602f4b00187384264313ccdbcb09a6e1337e3d331,2025-07-07T04:15:31.707000 +CVE-2025-7111,1,1,0bb458236d4f2833e2afc9ee2a0409849ac32b5fc5d42632aa727ab512e0958a,2025-07-07T05:15:42.367000 +CVE-2025-7112,1,1,c72213c346cc2670b45f717f2184ee8ba3c7c3d3c0c85dd55deb4c8343ae0400,2025-07-07T05:15:42.607000 +CVE-2025-7113,1,1,378c791a391810b24ec13a0a39c0ddad93df0fc0fc96459e7c5a0fbfb93a18f9,2025-07-07T05:15:42.853000 +CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000