From 4a953dccf9ae6145eefa8312c0f4c2c833865f33 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 3 Jun 2025 12:03:54 +0000 Subject: [PATCH] Auto-Update: 2025-06-03T12:00:19.291650+00:00 --- CVE-2023/CVE-2023-495xx/CVE-2023-49528.json | 90 +++- CVE-2024/CVE-2024-364xx/CVE-2024-36486.json | 60 +++ CVE-2024/CVE-2024-462xx/CVE-2024-46256.json | 41 +- CVE-2024/CVE-2024-462xx/CVE-2024-46257.json | 41 +- CVE-2024/CVE-2024-525xx/CVE-2024-52561.json | 60 +++ CVE-2024/CVE-2024-541xx/CVE-2024-54189.json | 60 +++ CVE-2024/CVE-2024-61xx/CVE-2024-6119.json | 478 +++++++++++++++++++- CVE-2025/CVE-2025-313xx/CVE-2025-31359.json | 60 +++ CVE-2025/CVE-2025-43xx/CVE-2025-4392.json | 68 +++ CVE-2025/CVE-2025-51xx/CVE-2025-5137.json | 6 +- CVE-2025/CVE-2025-54xx/CVE-2025-5492.json | 141 ++++++ CVE-2025/CVE-2025-54xx/CVE-2025-5493.json | 141 ++++++ README.md | 29 +- _state.csv | 31 +- 14 files changed, 1249 insertions(+), 57 deletions(-) create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36486.json create mode 100644 CVE-2024/CVE-2024-525xx/CVE-2024-52561.json create mode 100644 CVE-2024/CVE-2024-541xx/CVE-2024-54189.json create mode 100644 CVE-2025/CVE-2025-313xx/CVE-2025-31359.json create mode 100644 CVE-2025/CVE-2025-43xx/CVE-2025-4392.json create mode 100644 CVE-2025/CVE-2025-54xx/CVE-2025-5492.json create mode 100644 CVE-2025/CVE-2025-54xx/CVE-2025-5493.json diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49528.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49528.json index ff999b39bfc..03c1891a32a 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49528.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49528.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49528", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T06:15:06.320", - "lastModified": "2024-11-21T08:33:30.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T11:00:35.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,108 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ffmpeg:ffmpeg:6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9E88B2-A11F-475E-A456-538734144487" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10691", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://trac.ffmpeg.org/ticket/10691", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json new file mode 100644 index 00000000000..81ba73e51c0 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36486.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-36486", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2025-06-03T10:15:20.657", + "lastModified": "2025-06-03T11:15:20.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-62" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2126", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46256.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46256.json index 7d2ddb43d39..511c8d61ad6 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46256.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46256.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46256", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-27T18:15:05.787", - "lastModified": "2024-10-24T17:15:16.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T11:55:42.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jc21:nginx_proxy_manager:2.11.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6AAC6DBD-AAF7-4528-A360-F0297F834C57" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/NginxProxyManager/nginx-proxy-manager/blob/v2.11.3/backend/internal/certificate.js#L830", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc466", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/NginxProxyManager/nginx-proxy-manager/pull/4073/commits/c39d5433bcd13993def222bbb2b6988bbb810a05", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/barttran2k/POC_CVE-2024-46256", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46257.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46257.json index 1571b288d12..b369b66e1a4 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46257.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46257", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-27T18:15:05.870", - "lastModified": "2024-10-24T18:15:08.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-03T11:55:19.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jc21:nginx_proxy_manager:2.11.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6AAC6DBD-AAF7-4528-A360-F0297F834C57" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/NginxProxyManager/nginx-proxy-manager/blob/v2.11.3/backend/internal/certificate.js#L870", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc466", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/NginxProxyManager/nginx-proxy-manager/pull/4073/commits/c39d5433bcd13993def222bbb2b6988bbb810a05", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/barttran2k/POC_CVE-2024-46256", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json new file mode 100644 index 00000000000..3a33f3b682a --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52561.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-52561", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2025-06-03T10:15:21.857", + "lastModified": "2025-06-03T11:15:20.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is deleted, a root service verifies and modifies the ownership of the snapshot files. By using a symlink, an attacker can change the ownership of files owned by root to a lower-privilege user, potentially leading to privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-708" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2123", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2123", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json new file mode 100644 index 00000000000..3d5dcf71032 --- /dev/null +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54189.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-54189", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2025-06-03T10:15:22.040", + "lastModified": "2025-06-03T11:15:20.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-62" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2124", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2124", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6119.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6119.json index 5a49a4752d5..12e2f04e7f5 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6119.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6119", "sourceIdentifier": "openssl-security@openssl.org", "published": "2024-09-03T16:15:07.177", - "lastModified": "2024-11-21T09:49:00.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-03T10:51:54.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -49,40 +69,478 @@ "value": "CWE-843" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.15", + "matchCriteriaId": "F6B2B529-0ABC-49F4-BD03-380F291A84D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.7", + "matchCriteriaId": "30CD2859-B247-4957-A511-0FE284AA4A3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2.0", + "versionEndExcluding": "3.2.3", + "matchCriteriaId": "B822EA84-566B-44F2-9485-8A97103249D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3.0", + "versionEndExcluding": "3.3.2", + "matchCriteriaId": "37FD7956-A868-459B-90EA-C0D2DCF63AFC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDAC85F0-93AF-4BE3-AE1A-8ADAF1CDF9AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD886814-B4A0-4764-9F08-2060601D8E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "C2D814BE-93EC-42EF-88C5-EA7E7DF07BE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:brocade_fabric_operating_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2119FFC-08F9-4C3F-881C-9C72916BC652" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3D9B255-C1AF-42D1-BF9B-13642FBDC080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7296A1F2-D315-4FD5-8A73-65C480C855BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5921A877-18BF-43FE-915C-D226E140ACFC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1236B66D-EB11-4324-929F-E2B86683C3C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "281DFC67-46BB-4FC2-BE03-3C65C9311F65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECF32BB1-9A58-4821-AE49-5D5C8200631F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F21DE67F-CDFD-4D36-9967-633CD0240C6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1AB1EC2-2560-494A-A51B-6F20CE318FEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58DE2B52-4E49-4CD0-9310-00291B0352C7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/openssl/openssl/commit/05f360d9e849a1b277db628f1f13083a7f8dd04f", - "source": "openssl-security@openssl.org" + "source": "openssl-security@openssl.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/openssl/openssl/commit/06d1dc3fa96a2ba5a3e22735a033012aadc9f0d6", - "source": "openssl-security@openssl.org" + "source": "openssl-security@openssl.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/openssl/openssl/commit/621f3729831b05ee828a3203eddb621d014ff2b2", - "source": "openssl-security@openssl.org" + "source": "openssl-security@openssl.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/openssl/openssl/commit/7dfcee2cd2a63b2c64b9b4b0850be64cb695b0a0", - "source": "openssl-security@openssl.org" + "source": "openssl-security@openssl.org", + "tags": [ + "Patch" + ] }, { "url": "https://openssl-library.org/news/secadv/20240903.txt", - "source": "openssl-security@openssl.org" + "source": "openssl-security@openssl.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/09/03/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.freebsd.org/archives/freebsd-security/2024-September/000303.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240912-0001/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json new file mode 100644 index 00000000000..bbec0e6c377 --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31359.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-31359", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2025-06-03T10:15:22.240", + "lastModified": "2025-06-03T11:15:20.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A directory traversal vulnerability exists in the PVMP package unpacking functionality of Parallels Desktop for Mac version 20.2.2 (55879). This vulnerability can be exploited by an attacker to write to arbitrary files, potentially leading to privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2160", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2160", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-43xx/CVE-2025-4392.json b/CVE-2025/CVE-2025-43xx/CVE-2025-4392.json new file mode 100644 index 00000000000..163e53c80a5 --- /dev/null +++ b/CVE-2025/CVE-2025-43xx/CVE-2025-4392.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-4392", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-06-03T10:15:22.397", + "lastModified": "2025-06-03T10:15:22.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Shared Files \u2013 Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via html File uploads in all versions up to, and including, 1.7.48 due to insufficient input sanitization and output escaping within the sanitize_file() function. This makes it possible for unauthenticated attackers to bypass the plugin\u2019s MIME-only checks and inject arbitrary web scripts in pages that will execute whenever a user accesses the html file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/anssilaitila/shared-files/blob/master/admin/class-sf-admin-allow-more-file-types.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3304053/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/shared-files/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/469a9c8a-0708-4c93-99d8-e9157a1f91f5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5137.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5137.json index 242ad272cfb..cfc70e86dca 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5137.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5137.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5137", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T00:15:23.257", - "lastModified": "2025-05-28T18:15:29.657", + "lastModified": "2025-06-03T10:15:22.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -141,6 +141,10 @@ "url": "https://vuldb.com/?submit.571933", "source": "cna@vuldb.com" }, + { + "url": "https://vuldb.com/?submit.585711", + "source": "cna@vuldb.com" + }, { "url": "https://github.com/CyberPunk-Infernity/Advisory/issues/2", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5492.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5492.json new file mode 100644 index 00000000000..0d1675ff486 --- /dev/null +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5492.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5492", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T11:15:21.023", + "lastModified": "2025-06-03T11:15:21.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.310909", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310909", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.575244", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json new file mode 100644 index 00000000000..f2ce677500e --- /dev/null +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5493.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-5493", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-03T11:15:21.230", + "lastModified": "2025-06-03T11:15:21.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Baison Channel Middleware Product 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file /e3api/api/main/ToJsonByControlName. The manipulation of the argument data leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://medium.com/@luoluoxi311/sql-injection-in-baison-channel-middleware-product-version-2-0-1-e0d1ec95c697", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310910", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310910", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.586972", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 73ce0882ec7..74d67b58fc8 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-03T10:00:19.496425+00:00 +2025-06-03T12:00:19.291650+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-03T09:15:23.007000+00:00 +2025-06-03T11:55:42.657000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296297 +296304 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `7` -- [CVE-2025-1725](CVE-2025/CVE-2025-17xx/CVE-2025-1725.json) (`2025-06-03T09:15:22.487`) -- [CVE-2025-41428](CVE-2025/CVE-2025-414xx/CVE-2025-41428.json) (`2025-06-03T08:15:19.467`) -- [CVE-2025-4420](CVE-2025/CVE-2025-44xx/CVE-2025-4420.json) (`2025-06-03T09:15:22.673`) -- [CVE-2025-46355](CVE-2025/CVE-2025-463xx/CVE-2025-46355.json) (`2025-06-03T08:15:19.813`) -- [CVE-2025-5103](CVE-2025/CVE-2025-51xx/CVE-2025-5103.json) (`2025-06-03T09:15:22.840`) -- [CVE-2025-5116](CVE-2025/CVE-2025-51xx/CVE-2025-5116.json) (`2025-06-03T09:15:23.007`) +- [CVE-2024-36486](CVE-2024/CVE-2024-364xx/CVE-2024-36486.json) (`2025-06-03T10:15:20.657`) +- [CVE-2024-52561](CVE-2024/CVE-2024-525xx/CVE-2024-52561.json) (`2025-06-03T10:15:21.857`) +- [CVE-2024-54189](CVE-2024/CVE-2024-541xx/CVE-2024-54189.json) (`2025-06-03T10:15:22.040`) +- [CVE-2025-31359](CVE-2025/CVE-2025-313xx/CVE-2025-31359.json) (`2025-06-03T10:15:22.240`) +- [CVE-2025-4392](CVE-2025/CVE-2025-43xx/CVE-2025-4392.json) (`2025-06-03T10:15:22.397`) +- [CVE-2025-5492](CVE-2025/CVE-2025-54xx/CVE-2025-5492.json) (`2025-06-03T11:15:21.023`) +- [CVE-2025-5493](CVE-2025/CVE-2025-54xx/CVE-2025-5493.json) (`2025-06-03T11:15:21.230`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `5` -- [CVE-2024-0579](CVE-2024/CVE-2024-05xx/CVE-2024-0579.json) (`2025-06-03T09:15:21.340`) +- [CVE-2023-49528](CVE-2023/CVE-2023-495xx/CVE-2023-49528.json) (`2025-06-03T11:00:35.743`) +- [CVE-2024-46256](CVE-2024/CVE-2024-462xx/CVE-2024-46256.json) (`2025-06-03T11:55:42.657`) +- [CVE-2024-46257](CVE-2024/CVE-2024-462xx/CVE-2024-46257.json) (`2025-06-03T11:55:19.547`) +- [CVE-2024-6119](CVE-2024/CVE-2024-61xx/CVE-2024-6119.json) (`2025-06-03T10:51:54.117`) +- [CVE-2025-5137](CVE-2025/CVE-2025-51xx/CVE-2025-5137.json) (`2025-06-03T10:15:22.570`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f09fcd44633..a48d4bbea8a 100644 --- a/_state.csv +++ b/_state.csv @@ -239483,7 +239483,7 @@ CVE-2023-49502,0,0,69af41f78008495447faebfcddd8fb8f31648e607af034680c599387b5e34 CVE-2023-49508,0,0,a06f67b805f448f282f17a49613360ae1ef3e331d48eb4a72cdc35f3932734bd,2025-03-27T15:15:47.470000 CVE-2023-4951,0,0,1bbc4959ac980f797457caaf60413d1bbf7dabd5bc8076002f966e17295d986f,2024-11-21T08:36:20.073000 CVE-2023-49515,0,0,a4c0f2e305f9bd09bbc07b299160e9ee82b974a0de89b6dbf4caf99ad0f89a33,2024-11-21T08:33:29.953000 -CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b910,2024-11-21T08:33:30.187000 +CVE-2023-49528,0,1,9e1bf8b1430fa2f7fade812edc2a9f2119d6570f4b75e0e01a07411c6e244e88,2025-06-03T11:00:35.743000 CVE-2023-49539,0,0,6c1a1c576d32ef46d5e4268335e72acb623b3fb07800faa6d6779ff5f8b6d865,2025-04-14T13:03:09.210000 CVE-2023-49540,0,0,f48df38fc2cc2401a7c459c3ce7d9fc5cdd2304594218c5a375b797b03c07892,2025-04-14T13:03:20.370000 CVE-2023-49543,0,0,eca47ceaa9faa03870d8f334777ac5e443d94c5cb84920320f11c792c02ac35b,2025-04-18T14:21:05.953000 @@ -244660,7 +244660,7 @@ CVE-2024-0575,0,0,666db6d006ad62a3798810cdf677ce8703490110d9506ea423387c568d8644 CVE-2024-0576,0,0,ad7a11f1101011fcccc639cc126df4bf996c2095ae6ccfc69cc179008012f4d5,2024-11-21T08:46:55.867000 CVE-2024-0577,0,0,6da93877f20c21635a4796302f324842a4d17e9d36ff795581ac357d18c84502,2024-11-21T08:46:56 CVE-2024-0578,0,0,ee96b899589e161f2fa6ec7b5e57230eca35c9f889dd1f0b522a3b67c1a43964,2024-11-21T08:46:56.177000 -CVE-2024-0579,0,1,364c5be124a0fa43fcbd1d1c0c59ceb71fea47bc06c30562fd762ed415efb7a4,2025-06-03T09:15:21.340000 +CVE-2024-0579,0,0,364c5be124a0fa43fcbd1d1c0c59ceb71fea47bc06c30562fd762ed415efb7a4,2025-06-03T09:15:21.340000 CVE-2024-0580,0,0,4f03021d504adea5906d25054a7bdbbeee6b07de5251752c2f6620a9f1d606c3,2024-11-21T08:46:56.453000 CVE-2024-0581,0,0,195cad63f48edfacf562edbfafcc549b51805ce4e6c8c685d59db42934309bf3,2024-11-21T08:46:56.580000 CVE-2024-0582,0,0,a162ed06c8be1ace9eb09441c3e8b77ff26337827cb8ad9e2481a1cd8134a776,2024-11-21T08:46:56.703000 @@ -262593,6 +262593,7 @@ CVE-2024-36481,0,0,4eb9f12e83487746bcd563f74e1338838b3bacec77ea996220050453df93a CVE-2024-36482,0,0,535472baf1dda6517f1f0290a0b6663d8509986e45cf2f1daae2170dddb08280,2025-02-04T18:27:28.993000 CVE-2024-36484,0,0,a06783a9b3c79d8cb9b5fe8bfffb1618ea1a5c1aab2918e64ca3d8f674b8e0e9,2024-11-21T09:22:16.280000 CVE-2024-36485,0,0,d951588f4dcc00d26595f8d25b71cc0d010f10ca23d6ec7bebb340fbcf7c88da,2024-11-07T11:15:04.637000 +CVE-2024-36486,1,1,f73d4a75bbec382c2c22d4bedbdf9571ea4a7e892b6da8db6348c9897cdcd113,2025-06-03T11:15:20.383000 CVE-2024-36488,0,0,abe66b275816c86c5f144981d7bda84aea8ae8a17414a41070e511c1200662b4,2025-02-04T18:32:08.450000 CVE-2024-36489,0,0,483f02515bfc91c5ae3d16c61773df6c14d7d1b71a9ade79929d031b233a7f89,2024-11-21T09:22:16.667000 CVE-2024-3649,0,0,9d4b3c873377dc252861a0a03bd9c832139a807a0ffd6ec04c3597a6690414bd,2024-11-21T09:30:04.903000 @@ -270040,8 +270041,8 @@ CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8a CVE-2024-46241,0,0,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000 CVE-2024-46242,0,0,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000 CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0b1,2025-02-11T02:15:35.090000 -CVE-2024-46256,0,0,2cf9e791598dc4f7b0037a4042d6e31a14af13108ec122cc018fd2a7c094474b,2024-10-24T17:15:16.690000 -CVE-2024-46257,0,0,5509f1c6f98cff35b4c59f758c1790a3fd61a38a5163d0fe836d3bf1c1d10548,2024-10-24T18:15:08.617000 +CVE-2024-46256,0,1,3daa31071c4b67edd9f0d11a3fc63d598231ffb72f7368afe378fcf13211cd21,2025-06-03T11:55:42.657000 +CVE-2024-46257,0,1,594c24a594c08b09fcac1af5b5219d4ff3f22ab5b2e2707d0c7b4cb5eb11789a,2025-06-03T11:55:19.547000 CVE-2024-46258,0,0,f0370fbfdad86ce1dfd5697a2aae76d6a5956ed64072b68df4d04522255e7fe0,2025-03-14T16:15:35.750000 CVE-2024-46259,0,0,a06e19335a00ccd45e6fb45880d0b8b0290c81e26923d63fcfc67e365dce9d63,2025-03-18T17:15:42.877000 CVE-2024-4626,0,0,e6a81841b054989b62fde9d622901d07198d294f1608fb279a45bf1cc90a81a1,2024-11-21T09:43:14.590000 @@ -274846,6 +274847,7 @@ CVE-2024-52558,0,0,862aa816f99d7d175aef88936bc531a11569a19b5f814c5d7b923875345c7 CVE-2024-52559,0,0,af632a7cbb87ee504be0a00b900d193f82666532e997cddf8a97d190ed2c3153,2025-03-07T12:32:44.420000 CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000 CVE-2024-52560,0,0,17f5696064cc8a54449a3e1cfd601a790042146971352f114ead14ce71af8bb4,2025-02-27T03:15:10.573000 +CVE-2024-52561,1,1,ae58a3d9d667cb71a74b2a189fc197d330ecda202d1ff14b20d44ddd32761443,2025-06-03T11:15:20.513000 CVE-2024-52564,0,0,082fb97e963e24eeaf48108489383b26257575861650145a72a41c8a27e90eeb,2024-12-05T10:31:40.663000 CVE-2024-52565,0,0,02d8cf9601a79a81a90ae9c5bdc3d5a4c9c0865f4264720b000e5fe215f3cc2e,2024-12-10T14:30:45.133000 CVE-2024-52566,0,0,ad9914b2c2d53afe57085e24afde6d252d9adbd5430cfab4bef8a3994295e334,2024-12-10T14:30:45.280000 @@ -276032,6 +276034,7 @@ CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39 CVE-2024-5418,0,0,e8b4cd9b422aa40da5d2622d5e29796eb5a07db3f41b03941ba29e731fed299e,2025-03-24T14:25:36.727000 CVE-2024-54181,0,0,3e04974e8b1a6b14bc562b3f38845258be106e346d87e72f2301979081de7867,2025-03-28T16:32:40.990000 CVE-2024-54188,0,0,ec9d6aa982b8b4cba1cea93620070be8cc8bcc8a69afc701b43a83a98178fa89,2025-05-23T19:15:21.850000 +CVE-2024-54189,1,1,53b3c84b96ec6f2b48c423db2ab6870480f6c5c9438d15dd5505454cf313d7c5,2025-06-03T11:15:20.613000 CVE-2024-5419,0,0,bf78f58706f13dc16fbd00574fc12a2ad63186889150404f7c80cf6aaa4041da,2024-11-21T09:47:37.083000 CVE-2024-54191,0,0,247e99cd867b0b816f93e1330170d487e47438a01b1b24e3eb1ed293d8adb8cf,2025-01-16T16:21:27.237000 CVE-2024-54193,0,0,d4064cbcdedae86603fba40721ede5426ca6ed68b9bf4e5893ada8c0fb6b87d9,2025-01-11T13:15:26.840000 @@ -278704,7 +278707,7 @@ CVE-2024-6115,0,0,eec9b9fa172ac256762e1ff94626bf7be5708125578f492f47c61123573760 CVE-2024-6116,0,0,a82b4f9e406682e1c346ea922968aed67ed34cab517fa3b4b09f35029b051a3b,2024-11-21T09:48:59.623000 CVE-2024-6117,0,0,461527e133dd2edd82006c6f54e8f321e4f3b25ffcc332ed5755abacd85bd057,2024-08-30T17:41:50.753000 CVE-2024-6118,0,0,cfcc0b86a9899219d3949b5d35ce4b674191c1f8be378def04f73b05ae9103c1,2024-08-30T17:44:20.537000 -CVE-2024-6119,0,0,8626ecefe5db60c118b177ef65e56414abc72e3b59bc18284ff370302e522272,2024-11-21T09:49:00.040000 +CVE-2024-6119,0,1,8d46ea9a4d913a477553b4718f35f4aeadc8a2295b88657096091a3c540051a5,2025-06-03T10:51:54.117000 CVE-2024-6120,0,0,cb3266172a0dbddc29d2c5abd4187ea149af404c82d58bd0b8d19d6c5050b3c6,2024-11-21T09:49:00.237000 CVE-2024-6121,0,0,7876e6b9d760c8a34902e8bd733e688a853803265af121afc610b913d33c3095,2024-11-21T09:49:00.370000 CVE-2024-6122,0,0,275d88eab238bef7eb77d1af6c98aea5a6837e54aba2e2131e7a267a5fb0c32c,2024-11-21T09:49:00.507000 @@ -283691,7 +283694,7 @@ CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d CVE-2025-1717,0,0,3d4f0d449e7852a9bab717d0d55b537c9dc57d522d200e81bab92be20a7c833d,2025-03-11T16:12:42.783000 CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000 CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847ed,2025-03-17T07:15:33.467000 -CVE-2025-1725,1,1,484f4f3b008cf8f410d412b639fcc32bd2e1e80b242bac0d03000edf1c5898a4,2025-06-03T09:15:22.487000 +CVE-2025-1725,0,0,484f4f3b008cf8f410d412b639fcc32bd2e1e80b242bac0d03000edf1c5898a4,2025-06-03T09:15:22.487000 CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000 CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000 CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000 @@ -291315,6 +291318,7 @@ CVE-2025-31352,0,0,3b4ee61ff7706e5b838ec3976d4739ae6e58eadd39aa9e1b3ccd9b903a2bb CVE-2025-31353,0,0,aade972dfa9ec47d3e07b242f41f20d76a01f8f078e181747ee000ca91c0162c,2025-04-17T20:21:48.243000 CVE-2025-31354,0,0,a2c1ecbfcb3235477ad8200431c0ea4c81321e989c49ca93cbcc9e6a449508c8,2025-04-15T18:39:43.697000 CVE-2025-31357,0,0,10568eb634d6e712fcbab95ba9d1ba1b9cae9c7b98346cc44a3edcb291c43f89,2025-04-16T13:25:37.340000 +CVE-2025-31359,1,1,1d3622d08cc48c9b0671aec4181cb1d8ea59cbc2bc6ecdef7deac6781b872199,2025-06-03T11:15:20.913000 CVE-2025-3136,0,0,7ff98ba975809b4188d01f2e115e9c45862abffa34dc2aa33ad7cd01529a1bca,2025-05-28T15:59:54.130000 CVE-2025-31360,0,0,d1f586e795abef0eb367609debec6330cd41ffe8fbde4933f6aef94b2cc696ff,2025-04-16T13:25:37.340000 CVE-2025-31362,0,0,29e714bdac918165d1f72d9b66a1fef39fc1fe95242e3501acdc160e75ffc0c8,2025-04-11T15:39:52.920000 @@ -294017,7 +294021,7 @@ CVE-2025-41414,0,0,e15bca7d4059421d15d5cb35dc483cbefc52e8d9cd9f55b31b9d84f79a125 CVE-2025-4142,0,0,78a1ea715ae46e4bda0a693a8542472224c3dca467cf3911b9ec4f409b46b000,2025-05-12T19:39:50.053000 CVE-2025-41423,0,0,3ae1e637900a2dfc5b6bacaa494e26a0b5d8e1e48accef6073153be61f7a9347,2025-04-29T13:52:47.470000 CVE-2025-41426,0,0,43242131e19ec18f330497e91493c38832fad38a58a843ab859c1d5a86371244,2025-05-21T20:24:58.133000 -CVE-2025-41428,1,1,05da2590e70d1e08d485e3c1627cbb1dfad00722d6df324d58ae8555e7344690,2025-06-03T08:15:19.467000 +CVE-2025-41428,0,0,05da2590e70d1e08d485e3c1627cbb1dfad00722d6df324d58ae8555e7344690,2025-06-03T08:15:19.467000 CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17fbc,2025-05-19T13:35:20.460000 CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000 CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000 @@ -294337,6 +294341,7 @@ CVE-2025-43916,0,0,681d8be38d92746749b1aa52bc81a99ae8dcb7d5c6c1be22a9ecf0d141bf9 CVE-2025-43917,0,0,6cbc8a0cc4b5f4a260ea1bcaa2e61bc873dc43de357e9552c071e8ec2a49bca5,2025-04-21T14:23:45.950000 CVE-2025-43918,0,0,c6804f12f91fd2a33114034d2a7e21d55151c0cf36b011a784bd1cc327d47c14,2025-04-21T14:23:45.950000 CVE-2025-43919,0,0,755abcb8d09616a195e9d6af1306163e6a8ac43b52edd282a6c37eaf3c4a6f2b,2025-04-28T14:15:22.137000 +CVE-2025-4392,1,1,dac40497d85d0008ac6df90c7725f33db178c5c730ecf0a95d45819f9fba527e,2025-06-03T10:15:22.397000 CVE-2025-43920,0,0,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000 CVE-2025-43921,0,0,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000 CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000 @@ -294400,7 +294405,7 @@ CVE-2025-4419,0,0,280ab2097f0627a87fc9bc990e1fbeb501026297486a153453a713f412e7cb CVE-2025-44192,0,0,bbf878f3192590ae7f65b7dd525822e7ec5ccf80ca743afb76c106db312359e8,2025-05-12T19:42:18.530000 CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4d4d,2025-05-12T19:42:08.603000 CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000 -CVE-2025-4420,1,1,ce038fb29a6692be764c07fd478227cfce695047a961e4cb45ef9ab346d0ddd9,2025-06-03T09:15:22.673000 +CVE-2025-4420,0,0,ce038fb29a6692be764c07fd478227cfce695047a961e4cb45ef9ab346d0ddd9,2025-06-03T09:15:22.673000 CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000 CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000 CVE-2025-4429,0,0,fe6071399e142802408b914c5bdedf40a11e5b9791557c888b05a6344723a056,2025-05-30T16:31:03.107000 @@ -294786,7 +294791,7 @@ CVE-2025-46349,0,0,1714a97271744ee922f4bd027ddde23d095fab400e525c7e78a72152293a3 CVE-2025-4635,0,0,dbd97ddcf9f06e6a17bd98831167ca852ef57632eda54b68ef8eca53b0008e92,2025-05-30T16:31:03.107000 CVE-2025-46350,0,0,e9c2d732d02d04db30379a06f4d06a3199d3f19fe29e090eebfdcec4aeb7f535,2025-05-09T13:57:36.823000 CVE-2025-46352,0,0,618391598a4bc31a1d4677ab5a474da78aeac6261ac4ae8b26099a8c01185f09,2025-05-30T16:31:03.107000 -CVE-2025-46355,1,1,1807f41563bddcc346794c010d8d1d00e0f382923616bb8bb587edc58bb97041,2025-06-03T08:15:19.813000 +CVE-2025-46355,0,0,1807f41563bddcc346794c010d8d1d00e0f382923616bb8bb587edc58bb97041,2025-06-03T08:15:19.813000 CVE-2025-4636,0,0,42769483161d9081ca44d7da54fb93931edabd656065d5921f77e2f9979ff65e,2025-05-30T16:31:03.107000 CVE-2025-4637,0,0,6a6f5a6b16c4a5dc9c7dfdefe827d1876d1a6cd89fb863be894c5faba3f21b65,2025-05-16T14:43:56.797000 CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000 @@ -296058,7 +296063,7 @@ CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c9394 CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000 CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000 CVE-2025-5100,0,0,a54df1e8b0bff17450a1f67dfee2545841c6f379cdcd252b360f4d2a6c61fdc9,2025-05-27T16:15:34.280000 -CVE-2025-5103,1,1,af4594b973fdd953cec06d0755700664db10b8fb67ea2802be047b4e3fd3bb5b,2025-06-03T09:15:22.840000 +CVE-2025-5103,0,0,af4594b973fdd953cec06d0755700664db10b8fb67ea2802be047b4e3fd3bb5b,2025-06-03T09:15:22.840000 CVE-2025-5105,0,0,7ec1994145b2106c72a5e3c1031b0347b4a7435fd8dfdb2d41bb64c0d8abcf2a,2025-05-23T15:54:42.643000 CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68bb,2025-05-23T15:54:42.643000 CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000 @@ -296069,7 +296074,7 @@ CVE-2025-5111,0,0,ab3c47416b65781d53c047fed78dbbb335dd4bed9307ae97643de9e73c2c42 CVE-2025-5112,0,0,f0cd0b8c93be317d3a2c0e92912b455b4fb61ee919b7fe6bebacd87c921bdc33,2025-05-23T15:54:42.643000 CVE-2025-5113,0,0,0bd61b4abacfc5745f349f466d36dc6433bff2c84afe9ce5402853e11bea600a,2025-06-02T17:32:17.397000 CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000 -CVE-2025-5116,1,1,3a3248d5910bdfdea3cbcccc91a56e9fb901b18c52c8f2836052f1a9c085e6e7,2025-06-03T09:15:23.007000 +CVE-2025-5116,0,0,3a3248d5910bdfdea3cbcccc91a56e9fb901b18c52c8f2836052f1a9c085e6e7,2025-06-03T09:15:23.007000 CVE-2025-5117,0,0,d8ff3473124b58dde3b831065aca2c1cf497de1bb078c68e491105627964201f,2025-05-28T15:01:30.720000 CVE-2025-5119,0,0,bf969a61748b203da4a3f2f501a91ebb4932bff138f2ad55051f80ff5d8eb019,2025-05-28T14:58:52.920000 CVE-2025-5122,0,0,f0e21910b241d49227076aad0272129f233644ba6bdfb930e332b9b2297be743,2025-05-29T14:29:50.247000 @@ -296085,7 +296090,7 @@ CVE-2025-5133,0,0,9efeb5e03ee463d00e42fc9de1ba56f91b977c7bd992a461e7b0ec85f68612 CVE-2025-5134,0,0,e6299a527615fdc21c9e0da34d766bbd97a350c6d1ff17bb4cf7353121119f1a,2025-05-28T18:15:29.287000 CVE-2025-5135,0,0,7e1e10f6dd0f2054f3d7d8d511a459c0778068a613df540a11dbd00c31fa1143,2025-05-28T18:15:29.410000 CVE-2025-5136,0,0,6b5f88824c6819c9067ba2a7cc4e9b248d29b2e219ade7b27acd010192e50f7f,2025-05-28T18:15:29.530000 -CVE-2025-5137,0,0,bd7b0939690c00ed16e8b3fb58c2a16dc513e9bfd444f41fa5f480b987908a57,2025-05-28T18:15:29.657000 +CVE-2025-5137,0,1,c83c907e9ec05e68313328484d50f5a3a65ffbd23d70539d45126ec5cf338d9e,2025-06-03T10:15:22.570000 CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000 CVE-2025-5139,0,0,1f6b6d6f74654497d336b663b2d16a5fe2eea3d0378c7d1c3577dfaa66e63c83,2025-05-28T14:58:52.920000 CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000 @@ -296296,3 +296301,5 @@ CVE-2025-5445,0,0,4170f3c2f537d54cec187b705ba4828958c100062593b53f1a91ca989cc07f CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a192,2025-06-02T17:32:17.397000 CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000 CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000 +CVE-2025-5492,1,1,b5038878420625bb26f8489e550a4b7b6eed1512f61db614ac007c24853837c9,2025-06-03T11:15:21.023000 +CVE-2025-5493,1,1,a858c3594792a90731d1aaa0c94c119619aaf3566be815bfa56f0bef72a8553e,2025-06-03T11:15:21.230000