diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56468.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56468.json new file mode 100644 index 00000000000..0b1d999d212 --- /dev/null +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56468.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56468", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-07-08T23:15:22.840", + "lastModified": "2025-07-08T23:15:22.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere Data Replication VSAM for z/OS Remote Source 11.4 could allow a remote user to cause a denial of service by sending an invalid HTTP request to the log reading service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7239221", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27165.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27165.json new file mode 100644 index 00000000000..91bbe740f74 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27165.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27165", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:24.107", + "lastModified": "2025-07-08T22:15:24.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Stager versions 3.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb25-64.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27203.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27203.json new file mode 100644 index 00000000000..57d841022b7 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27203.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27203", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:24.717", + "lastModified": "2025-07-08T22:15:24.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/connect/apsb25-61.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30313.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30313.json new file mode 100644 index 00000000000..830a8a513c5 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30313.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30313", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:24.887", + "lastModified": "2025-07-08T22:15:24.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43591.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43591.json new file mode 100644 index 00000000000..e13da18234a --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43591.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43591", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:25.050", + "lastModified": "2025-07-08T22:15:25.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43592.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43592.json new file mode 100644 index 00000000000..908a582d434 --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43592.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43592", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:25.217", + "lastModified": "2025-07-08T22:15:25.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-435xx/CVE-2025-43594.json b/CVE-2025/CVE-2025-435xx/CVE-2025-43594.json new file mode 100644 index 00000000000..ec282c2e1ad --- /dev/null +++ b/CVE-2025/CVE-2025-435xx/CVE-2025-43594.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43594", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:25.397", + "lastModified": "2025-07-08T22:15:25.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions 19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-470xx/CVE-2025-47097.json b/CVE-2025/CVE-2025-470xx/CVE-2025-47097.json new file mode 100644 index 00000000000..41e54c774ed --- /dev/null +++ b/CVE-2025/CVE-2025-470xx/CVE-2025-47097.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47097", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:23.687", + "lastModified": "2025-07-08T23:15:23.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InCopy versions 20.3, 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-470xx/CVE-2025-47098.json b/CVE-2025/CVE-2025-470xx/CVE-2025-47098.json new file mode 100644 index 00000000000..df67d91677e --- /dev/null +++ b/CVE-2025/CVE-2025-470xx/CVE-2025-47098.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47098", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:23.850", + "lastModified": "2025-07-08T23:15:23.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InCopy versions 20.3, 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-470xx/CVE-2025-47099.json b/CVE-2025/CVE-2025-470xx/CVE-2025-47099.json new file mode 100644 index 00000000000..c71e4dd94fb --- /dev/null +++ b/CVE-2025/CVE-2025-470xx/CVE-2025-47099.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47099", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:24.013", + "lastModified": "2025-07-08T23:15:24.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InCopy versions 20.3, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47103.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47103.json new file mode 100644 index 00000000000..ed3cd0871b7 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47103.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47103", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:25.553", + "lastModified": "2025-07-08T22:15:25.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47119.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47119.json new file mode 100644 index 00000000000..a9bb656301a --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47119.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47119", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:24.173", + "lastModified": "2025-07-08T23:15:24.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47120.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47120.json new file mode 100644 index 00000000000..6edb879eb85 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47120.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47120", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:24.337", + "lastModified": "2025-07-08T23:15:24.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47121.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47121.json new file mode 100644 index 00000000000..f70055e8101 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47121.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47121", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:24.487", + "lastModified": "2025-07-08T23:15:24.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47122.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47122.json new file mode 100644 index 00000000000..2b6dd9168e5 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47122.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47122", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:24.640", + "lastModified": "2025-07-08T23:15:24.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47123.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47123.json new file mode 100644 index 00000000000..823576739f0 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47123.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47123", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:24.797", + "lastModified": "2025-07-08T23:15:24.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47124.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47124.json new file mode 100644 index 00000000000..03c8694fb47 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47124.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47124", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:24.953", + "lastModified": "2025-07-08T23:15:24.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47125.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47125.json new file mode 100644 index 00000000000..561816ec343 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47125.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47125", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:25.117", + "lastModified": "2025-07-08T23:15:25.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47126.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47126.json new file mode 100644 index 00000000000..0c8a572dd2d --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47126.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47126", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:25.280", + "lastModified": "2025-07-08T23:15:25.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47127.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47127.json new file mode 100644 index 00000000000..60747bfd4c1 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47127.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47127", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:25.443", + "lastModified": "2025-07-08T23:15:25.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47128.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47128.json new file mode 100644 index 00000000000..20aa8b78c75 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47128.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47128", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:25.593", + "lastModified": "2025-07-08T23:15:25.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47129.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47129.json new file mode 100644 index 00000000000..fc1316dfd47 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47129.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47129", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:25.757", + "lastModified": "2025-07-08T23:15:25.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47130.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47130.json new file mode 100644 index 00000000000..98c9ade1eca --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47130.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47130", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:25.910", + "lastModified": "2025-07-08T23:15:25.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47131.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47131.json new file mode 100644 index 00000000000..e54de932d57 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47131.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47131", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:26.073", + "lastModified": "2025-07-08T23:15:26.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47132.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47132.json new file mode 100644 index 00000000000..786f1c95f21 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47132.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47132", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:26.223", + "lastModified": "2025-07-08T23:15:26.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47133.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47133.json new file mode 100644 index 00000000000..d6813527dcd --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47133.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47133", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T23:15:26.390", + "lastModified": "2025-07-08T23:15:26.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47134.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47134.json new file mode 100644 index 00000000000..1312a7e6e64 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47134.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47134", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:25.703", + "lastModified": "2025-07-08T22:15:25.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-471xx/CVE-2025-47136.json b/CVE-2025/CVE-2025-471xx/CVE-2025-47136.json new file mode 100644 index 00000000000..2649192dc53 --- /dev/null +++ b/CVE-2025/CVE-2025-471xx/CVE-2025-47136.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-47136", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:25.857", + "lastModified": "2025-07-08T22:15:25.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49524.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49524.json new file mode 100644 index 00000000000..acfa0818ef3 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49524.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49524", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:26.010", + "lastModified": "2025-07-08T22:15:26.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49525.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49525.json new file mode 100644 index 00000000000..8b2cb7b0b16 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49525.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49525", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:26.183", + "lastModified": "2025-07-08T22:15:26.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49526.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49526.json new file mode 100644 index 00000000000..946ee17390b --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49526.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49526", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:26.340", + "lastModified": "2025-07-08T22:15:26.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49527.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49527.json new file mode 100644 index 00000000000..9557dbec295 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49527.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49527", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:26.500", + "lastModified": "2025-07-08T22:15:26.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49528.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49528.json new file mode 100644 index 00000000000..14bb804dd9b --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49528.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49528", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:26.657", + "lastModified": "2025-07-08T22:15:26.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49529.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49529.json new file mode 100644 index 00000000000..d24ba194a0c --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49529.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49529", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:26.810", + "lastModified": "2025-07-08T22:15:26.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49530.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49530.json new file mode 100644 index 00000000000..345d105a907 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49530.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49530", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:26.960", + "lastModified": "2025-07-08T22:15:26.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49531.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49531.json new file mode 100644 index 00000000000..4517cf47497 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49531.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49531", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:27.113", + "lastModified": "2025-07-08T22:15:27.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49532.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49532.json new file mode 100644 index 00000000000..43af4864ff3 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49532.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49532", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:27.273", + "lastModified": "2025-07-08T22:15:27.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49533.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49533.json new file mode 100644 index 00000000000..55e167bc1e1 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49533.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49533", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:27.423", + "lastModified": "2025-07-08T22:15:27.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. Scope is unchanged." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49534.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49534.json new file mode 100644 index 00000000000..9f8de6acf83 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49534.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49534", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:27.587", + "lastModified": "2025-07-08T22:15:27.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Scope is changed." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/aem-screens/apsb25-68.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-495xx/CVE-2025-49547.json b/CVE-2025/CVE-2025-495xx/CVE-2025-49547.json new file mode 100644 index 00000000000..0bbe0abd653 --- /dev/null +++ b/CVE-2025/CVE-2025-495xx/CVE-2025-49547.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-49547", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-07-08T22:15:27.737", + "lastModified": "2025-07-08T22:15:27.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Scope is changed." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/aem-screens/apsb25-68.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-535xx/CVE-2025-53547.json b/CVE-2025/CVE-2025-535xx/CVE-2025-53547.json new file mode 100644 index 00000000000..898d26a66ae --- /dev/null +++ b/CVE-2025/CVE-2025-535xx/CVE-2025-53547.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-53547", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-07-08T22:15:27.897", + "lastModified": "2025-07-08T22:15:27.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6550.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6550.json index a789e2a3a37..0805fda322f 100644 --- a/CVE-2025/CVE-2025-65xx/CVE-2025-6550.json +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6550.json @@ -2,13 +2,13 @@ "id": "CVE-2025-6550", "sourceIdentifier": "security@wordfence.com", "published": "2025-06-27T08:15:23.053", - "lastModified": "2025-07-07T15:38:38.413", - "vulnStatus": "Analyzed", + "lastModified": "2025-07-08T22:15:28.053", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018slider_options\u2019 parameter in all versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + "value": "The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018slider_options\u2019 parameter in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." }, { "lang": "es", @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,14 @@ "Product" ] }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3320280/", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3321887/", + "source": "security@wordfence.com" + }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4af2f136-5806-4d5e-a72d-486c4839a695?source=cve", "source": "security@wordfence.com", diff --git a/CVE-2025/CVE-2025-67xx/CVE-2025-6759.json b/CVE-2025/CVE-2025-67xx/CVE-2025-6759.json new file mode 100644 index 00000000000..39f8369accc --- /dev/null +++ b/CVE-2025/CVE-2025-67xx/CVE-2025-6759.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-6759", + "sourceIdentifier": "secure@citrix.com", + "published": "2025-07-08T22:15:28.213", + "lastModified": "2025-07-08T22:15:28.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in Windows Virtual Delivery Agent for CVAD and Citrix DaaS" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694820", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7197.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7197.json new file mode 100644 index 00000000000..1e75f045a46 --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7197.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7197", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-08T22:15:28.363", + "lastModified": "2025-07-08T22:15:28.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in code-projects Jonnys Liquor 1.0. This affects an unknown part of the file /admin/delete-row.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/18889016001/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315135", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315135", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.607819", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7198.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7198.json new file mode 100644 index 00000000000..8c12bdb319b --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7198.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7198", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-08T22:15:28.563", + "lastModified": "2025-07-08T22:15:28.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects Jonnys Liquor 1.0. This vulnerability affects unknown code of the file /admin/admin-area.php. The manipulation of the argument drink leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/18889016001/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315136", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315136", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.607820", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7199.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7199.json new file mode 100644 index 00000000000..1258fcc2a39 --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7199.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7199", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-08T23:15:26.547", + "lastModified": "2025-07-08T23:15:26.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in code-projects Library System 1.0. This issue affects some unknown processing of the file /notapprove.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Gemileo/CVE/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315137", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315137", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.607470", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-72xx/CVE-2025-7200.json b/CVE-2025/CVE-2025-72xx/CVE-2025-7200.json new file mode 100644 index 00000000000..d26e2855b5d --- /dev/null +++ b/CVE-2025/CVE-2025-72xx/CVE-2025-7200.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-7200", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-08T23:15:26.757", + "lastModified": "2025-07-08T23:15:26.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in krishna9772 Pharmacy Management System up to a2efc8442931ec9308f3b4cf4778e5701153f4e5. Affected is an unknown function of the file quantity_upd.php. The manipulation of the argument med_name/med_cat/ex_date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/horytick/CVE/blob/main/SQL%20Injection%20Vulnerability%20in%20Pharmacy%20Management%20System.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315138", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315138", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.607526", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 18d6facd4f4..9b39f39900e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-07-08T22:00:12.613889+00:00 +2025-07-08T23:55:11.663896+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-07-08T21:15:29.963000+00:00 +2025-07-08T23:15:26.757000+00:00 ``` ### Last Data Feed Release @@ -33,66 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -301104 +301150 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `46` -- [CVE-2025-37103](CVE-2025/CVE-2025-371xx/CVE-2025-37103.json) (`2025-07-08T20:15:26.033`) -- [CVE-2025-43582](CVE-2025/CVE-2025-435xx/CVE-2025-43582.json) (`2025-07-08T21:15:25.387`) -- [CVE-2025-43583](CVE-2025/CVE-2025-435xx/CVE-2025-43583.json) (`2025-07-08T21:15:25.543`) -- [CVE-2025-43584](CVE-2025/CVE-2025-435xx/CVE-2025-43584.json) (`2025-07-08T21:15:25.690`) -- [CVE-2025-49535](CVE-2025/CVE-2025-495xx/CVE-2025-49535.json) (`2025-07-08T21:15:26.113`) -- [CVE-2025-49536](CVE-2025/CVE-2025-495xx/CVE-2025-49536.json) (`2025-07-08T21:15:26.280`) -- [CVE-2025-49537](CVE-2025/CVE-2025-495xx/CVE-2025-49537.json) (`2025-07-08T21:15:26.437`) -- [CVE-2025-49538](CVE-2025/CVE-2025-495xx/CVE-2025-49538.json) (`2025-07-08T21:15:26.597`) -- [CVE-2025-49539](CVE-2025/CVE-2025-495xx/CVE-2025-49539.json) (`2025-07-08T21:15:26.757`) -- [CVE-2025-49540](CVE-2025/CVE-2025-495xx/CVE-2025-49540.json) (`2025-07-08T21:15:26.907`) -- [CVE-2025-49541](CVE-2025/CVE-2025-495xx/CVE-2025-49541.json) (`2025-07-08T21:15:27.060`) -- [CVE-2025-49542](CVE-2025/CVE-2025-495xx/CVE-2025-49542.json) (`2025-07-08T21:15:27.213`) -- [CVE-2025-49543](CVE-2025/CVE-2025-495xx/CVE-2025-49543.json) (`2025-07-08T21:15:27.360`) -- [CVE-2025-49544](CVE-2025/CVE-2025-495xx/CVE-2025-49544.json) (`2025-07-08T21:15:27.520`) -- [CVE-2025-49545](CVE-2025/CVE-2025-495xx/CVE-2025-49545.json) (`2025-07-08T21:15:27.670`) -- [CVE-2025-49546](CVE-2025/CVE-2025-495xx/CVE-2025-49546.json) (`2025-07-08T21:15:27.820`) -- [CVE-2025-49551](CVE-2025/CVE-2025-495xx/CVE-2025-49551.json) (`2025-07-08T21:15:27.970`) -- [CVE-2025-53355](CVE-2025/CVE-2025-533xx/CVE-2025-53355.json) (`2025-07-08T20:15:30.020`) -- [CVE-2025-7030](CVE-2025/CVE-2025-70xx/CVE-2025-7030.json) (`2025-07-08T21:15:28.773`) -- [CVE-2025-7031](CVE-2025/CVE-2025-70xx/CVE-2025-7031.json) (`2025-07-08T21:15:28.907`) -- [CVE-2025-7192](CVE-2025/CVE-2025-71xx/CVE-2025-7192.json) (`2025-07-08T20:15:30.830`) -- [CVE-2025-7193](CVE-2025/CVE-2025-71xx/CVE-2025-7193.json) (`2025-07-08T20:15:31.040`) -- [CVE-2025-7194](CVE-2025/CVE-2025-71xx/CVE-2025-7194.json) (`2025-07-08T21:15:29.763`) -- [CVE-2025-7196](CVE-2025/CVE-2025-71xx/CVE-2025-7196.json) (`2025-07-08T21:15:29.963`) +- [CVE-2025-47129](CVE-2025/CVE-2025-471xx/CVE-2025-47129.json) (`2025-07-08T23:15:25.757`) +- [CVE-2025-47130](CVE-2025/CVE-2025-471xx/CVE-2025-47130.json) (`2025-07-08T23:15:25.910`) +- [CVE-2025-47131](CVE-2025/CVE-2025-471xx/CVE-2025-47131.json) (`2025-07-08T23:15:26.073`) +- [CVE-2025-47132](CVE-2025/CVE-2025-471xx/CVE-2025-47132.json) (`2025-07-08T23:15:26.223`) +- [CVE-2025-47133](CVE-2025/CVE-2025-471xx/CVE-2025-47133.json) (`2025-07-08T23:15:26.390`) +- [CVE-2025-47134](CVE-2025/CVE-2025-471xx/CVE-2025-47134.json) (`2025-07-08T22:15:25.703`) +- [CVE-2025-47136](CVE-2025/CVE-2025-471xx/CVE-2025-47136.json) (`2025-07-08T22:15:25.857`) +- [CVE-2025-49524](CVE-2025/CVE-2025-495xx/CVE-2025-49524.json) (`2025-07-08T22:15:26.010`) +- [CVE-2025-49525](CVE-2025/CVE-2025-495xx/CVE-2025-49525.json) (`2025-07-08T22:15:26.183`) +- [CVE-2025-49526](CVE-2025/CVE-2025-495xx/CVE-2025-49526.json) (`2025-07-08T22:15:26.340`) +- [CVE-2025-49527](CVE-2025/CVE-2025-495xx/CVE-2025-49527.json) (`2025-07-08T22:15:26.500`) +- [CVE-2025-49528](CVE-2025/CVE-2025-495xx/CVE-2025-49528.json) (`2025-07-08T22:15:26.657`) +- [CVE-2025-49529](CVE-2025/CVE-2025-495xx/CVE-2025-49529.json) (`2025-07-08T22:15:26.810`) +- [CVE-2025-49530](CVE-2025/CVE-2025-495xx/CVE-2025-49530.json) (`2025-07-08T22:15:26.960`) +- [CVE-2025-49531](CVE-2025/CVE-2025-495xx/CVE-2025-49531.json) (`2025-07-08T22:15:27.113`) +- [CVE-2025-49532](CVE-2025/CVE-2025-495xx/CVE-2025-49532.json) (`2025-07-08T22:15:27.273`) +- [CVE-2025-49533](CVE-2025/CVE-2025-495xx/CVE-2025-49533.json) (`2025-07-08T22:15:27.423`) +- [CVE-2025-49534](CVE-2025/CVE-2025-495xx/CVE-2025-49534.json) (`2025-07-08T22:15:27.587`) +- [CVE-2025-49547](CVE-2025/CVE-2025-495xx/CVE-2025-49547.json) (`2025-07-08T22:15:27.737`) +- [CVE-2025-53547](CVE-2025/CVE-2025-535xx/CVE-2025-53547.json) (`2025-07-08T22:15:27.897`) +- [CVE-2025-6759](CVE-2025/CVE-2025-67xx/CVE-2025-6759.json) (`2025-07-08T22:15:28.213`) +- [CVE-2025-7197](CVE-2025/CVE-2025-71xx/CVE-2025-7197.json) (`2025-07-08T22:15:28.363`) +- [CVE-2025-7198](CVE-2025/CVE-2025-71xx/CVE-2025-7198.json) (`2025-07-08T22:15:28.563`) +- [CVE-2025-7199](CVE-2025/CVE-2025-71xx/CVE-2025-7199.json) (`2025-07-08T23:15:26.547`) +- [CVE-2025-7200](CVE-2025/CVE-2025-72xx/CVE-2025-7200.json) (`2025-07-08T23:15:26.757`) ### CVEs modified in the last Commit -Recently modified CVEs: `23` +Recently modified CVEs: `1` -- [CVE-2020-1171](CVE-2020/CVE-2020-11xx/CVE-2020-1171.json) (`2025-07-08T20:03:48.173`) -- [CVE-2020-1192](CVE-2020/CVE-2020-11xx/CVE-2020-1192.json) (`2025-07-08T20:03:48.173`) -- [CVE-2024-35144](CVE-2024/CVE-2024-351xx/CVE-2024-35144.json) (`2025-07-08T20:29:44.110`) -- [CVE-2024-35145](CVE-2024/CVE-2024-351xx/CVE-2024-35145.json) (`2025-07-08T20:29:30.803`) -- [CVE-2024-35146](CVE-2024/CVE-2024-351xx/CVE-2024-35146.json) (`2025-07-08T20:29:54.267`) -- [CVE-2024-35148](CVE-2024/CVE-2024-351xx/CVE-2024-35148.json) (`2025-07-08T20:27:05.503`) -- [CVE-2024-35150](CVE-2024/CVE-2024-351xx/CVE-2024-35150.json) (`2025-07-08T20:22:34.600`) -- [CVE-2025-0158](CVE-2025/CVE-2025-01xx/CVE-2025-0158.json) (`2025-07-08T20:06:15.347`) -- [CVE-2025-0759](CVE-2025/CVE-2025-07xx/CVE-2025-0759.json) (`2025-07-08T20:05:43.337`) -- [CVE-2025-1500](CVE-2025/CVE-2025-15xx/CVE-2025-1500.json) (`2025-07-08T20:14:36.577`) -- [CVE-2025-29267](CVE-2025/CVE-2025-292xx/CVE-2025-29267.json) (`2025-07-08T21:15:24.580`) -- [CVE-2025-31022](CVE-2025/CVE-2025-310xx/CVE-2025-31022.json) (`2025-07-08T20:15:25.710`) -- [CVE-2025-37102](CVE-2025/CVE-2025-371xx/CVE-2025-37102.json) (`2025-07-08T20:15:25.900`) -- [CVE-2025-47422](CVE-2025/CVE-2025-474xx/CVE-2025-47422.json) (`2025-07-08T21:15:25.947`) -- [CVE-2025-48917](CVE-2025/CVE-2025-489xx/CVE-2025-48917.json) (`2025-07-08T20:35:15.717`) -- [CVE-2025-48918](CVE-2025/CVE-2025-489xx/CVE-2025-48918.json) (`2025-07-08T20:34:54.967`) -- [CVE-2025-48919](CVE-2025/CVE-2025-489xx/CVE-2025-48919.json) (`2025-07-08T20:35:27.190`) -- [CVE-2025-48920](CVE-2025/CVE-2025-489xx/CVE-2025-48920.json) (`2025-07-08T20:35:36.687`) -- [CVE-2025-53480](CVE-2025/CVE-2025-534xx/CVE-2025-53480.json) (`2025-07-08T21:15:28.227`) -- [CVE-2025-53495](CVE-2025/CVE-2025-534xx/CVE-2025-53495.json) (`2025-07-08T20:15:30.183`) -- [CVE-2025-53496](CVE-2025/CVE-2025-534xx/CVE-2025-53496.json) (`2025-07-08T20:15:30.430`) -- [CVE-2025-53498](CVE-2025/CVE-2025-534xx/CVE-2025-53498.json) (`2025-07-08T21:15:28.380`) -- [CVE-2025-53499](CVE-2025/CVE-2025-534xx/CVE-2025-53499.json) (`2025-07-08T20:15:30.623`) +- [CVE-2025-6550](CVE-2025/CVE-2025-65xx/CVE-2025-6550.json) (`2025-07-08T22:15:28.053`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 86b478a6a5f..b1983342502 100644 --- a/_state.csv +++ b/_state.csv @@ -146933,7 +146933,7 @@ CVE-2020-11706,0,0,eeb8b638cf071245d8e93f3342f14ca45f3d2e4a2e7a21ed1fbde0b2d8007 CVE-2020-11707,0,0,db51c5eee738c62c43b8709f5d6b70925efb3e350231121ab8f26f9ebc6a1536,2024-11-21T04:58:26.883000 CVE-2020-11708,0,0,b5ddea211cc308f025c496f1c9162a7ce419e37388999e4c540d9fccfa3032d5,2024-11-21T04:58:27.020000 CVE-2020-11709,0,0,b76b211e9d44f50570ba99ce7aa237753934914dac0fe2eb13fb806b4ae9541b,2024-11-21T04:58:27.163000 -CVE-2020-1171,0,1,fdd43e2a228e0e6fca9517469132deb9b0fecb159501598222034454996a37f1,2025-07-08T20:03:48.173000 +CVE-2020-1171,0,0,fdd43e2a228e0e6fca9517469132deb9b0fecb159501598222034454996a37f1,2025-07-08T20:03:48.173000 CVE-2020-11710,0,0,0c881cb09aeff05a93a0b94dd8ba9913197a5ad156c9209bc4fdded71a2e1e29,2024-11-21T04:58:27.307000 CVE-2020-11711,0,0,f4106594acdf7e44ec44e6feabc08da09474b12d7322251671f1a20600de3f46,2024-11-21T04:58:27.460000 CVE-2020-11712,0,0,9e2cb49800083b936e9e71815a929f166c3eb08584dd8b1dfaa2e54aada3a68a,2024-11-21T04:58:27.617000 @@ -147140,7 +147140,7 @@ CVE-2020-11916,0,0,b030395624f14d3ddfb34e8361472323e30df1a28f655a305ea4e251b2e59 CVE-2020-11917,0,0,361631f362d68b1327f6ae97965cb78c31dc980e19423c04bf2133098762a588,2025-04-24T13:42:09.087000 CVE-2020-11918,0,0,ad61eeacd0c09e2e34ff7eb9fd5948a77d2c6632c01c9683c0aacb298d0c0a33,2025-04-24T13:42:14.090000 CVE-2020-11919,0,0,3e028743febf7e998688c904c500f4cadacf5153d3e236d340bfc0008532a36b,2025-04-24T13:42:19.443000 -CVE-2020-1192,0,1,c47824e3f62c77e180aab558e25326b7c33eac983a726e625edb039babafcdb7,2025-07-08T20:03:48.173000 +CVE-2020-1192,0,0,c47824e3f62c77e180aab558e25326b7c33eac983a726e625edb039babafcdb7,2025-07-08T20:03:48.173000 CVE-2020-11920,0,0,41a7c64babbfbc6eb1b671f40089d2f0fdd449cd6b55bdbf3f79c9e369f9da41,2024-11-21T04:58:54.423000 CVE-2020-11921,0,0,315b667529a9ff7f4c7afe17d5124be593ef5e060992adbd5bb6c18de7ee327d,2024-11-08T19:01:03.880000 CVE-2020-11922,0,0,34dee0addcbefd37e031f6dbedb5ad1741ebc2710364aac63adc194527b15f99,2024-11-21T04:58:54.733000 @@ -261859,12 +261859,12 @@ CVE-2024-35140,0,0,dcb39679630ddcaef3b6511185b27681ac1153141e804705769f97c9da434 CVE-2024-35141,0,0,3e97d4328bde3a3960ec1e8a98391f50d1264f252049e70e215d2b003d7be7ab,2025-01-29T21:00:00.257000 CVE-2024-35142,0,0,328375a79823855b00041d487da20dabcff386194ada082c322063fdb5041781,2025-01-27T19:25:19.840000 CVE-2024-35143,0,0,5cb5e3449a374a30898ff7b59de5af975c3a54dcd7a31450775ca701ccf638fe,2024-09-11T14:34:13.590000 -CVE-2024-35144,0,1,c7dc46b5e0083cf71157419587f0fa675122b2ed6ca9fe68b7f0237f4449877c,2025-07-08T20:29:44.110000 -CVE-2024-35145,0,1,edfcda8269262885485f0740f25d7261b38ddcae1efb0399b67f020015a9cf8f,2025-07-08T20:29:30.803000 -CVE-2024-35146,0,1,00239f993b6e1c35efef1dd7d8607382e63c963b80c88cf209cc8ef6f3f539eb,2025-07-08T20:29:54.267000 -CVE-2024-35148,0,1,b492ade691ffe1de33410a65849f0e785641a369c7a988d089b22e682d309018,2025-07-08T20:27:05.503000 +CVE-2024-35144,0,0,c7dc46b5e0083cf71157419587f0fa675122b2ed6ca9fe68b7f0237f4449877c,2025-07-08T20:29:44.110000 +CVE-2024-35145,0,0,edfcda8269262885485f0740f25d7261b38ddcae1efb0399b67f020015a9cf8f,2025-07-08T20:29:30.803000 +CVE-2024-35146,0,0,00239f993b6e1c35efef1dd7d8607382e63c963b80c88cf209cc8ef6f3f539eb,2025-07-08T20:29:54.267000 +CVE-2024-35148,0,0,b492ade691ffe1de33410a65849f0e785641a369c7a988d089b22e682d309018,2025-07-08T20:27:05.503000 CVE-2024-3515,0,0,34ca6c141b25b76cf038dbaf586f76e7d83b53d44af4d1d927517cbfe224c717,2024-12-19T16:19:23.533000 -CVE-2024-35150,0,1,fb3c75c51f7ebf1640fd776d1a28947067b13abe6ec9d60dbe8af6b1984a788b,2025-07-08T20:22:34.600000 +CVE-2024-35150,0,0,fb3c75c51f7ebf1640fd776d1a28947067b13abe6ec9d60dbe8af6b1984a788b,2025-07-08T20:22:34.600000 CVE-2024-35151,0,0,997e62f9e09bd79d901a818fa07d83a57b09161e5818037373bd99fb7a3f83e8,2024-08-23T15:32:15.270000 CVE-2024-35152,0,0,06c6f92d2caf727cd4e0214816e496c021be32e43d31786397f60659ca719146,2024-08-23T18:57:54.717000 CVE-2024-35153,0,0,72b7eff1e351197066dcedfe56c19ee4fca9d867b0c858ba84a516b5786df0b4,2024-11-21T09:19:49.987000 @@ -277792,6 +277792,7 @@ CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000 CVE-2024-56463,0,0,c91a97955e67636097d6c8d92cc78e5f006b9381a4b58d350ab149902990ae2e,2025-03-03T17:09:36.020000 CVE-2024-56467,0,0,a637c2bcf3b6a4a4b3f08718b44e1be4e289aad16c95ae9f9eab032a86fca295,2025-07-07T18:26:35.707000 +CVE-2024-56468,1,1,ff714809f0017608b02b1568a755730d7355f8721e1ec2e84d6131947b4e0bc8,2025-07-08T23:15:22.840000 CVE-2024-56469,0,0,8858433e3a23bbc4041cc9fa4ddadf0e8de10d95ea752f993edeb0505044f985,2025-03-27T16:45:12.210000 CVE-2024-5647,0,0,ab8dda8bbe1d15e33baced30b68dc6602e623ee999011776cef9f579e77b11cf,2025-07-03T15:13:53.147000 CVE-2024-56470,0,0,61c48c46be39e45171a09013b345ebbaf36a8d1a6bbca7b2ab400aedf5fb9ae6,2025-03-07T19:43:22.887000 @@ -282983,7 +282984,7 @@ CVE-2025-0149,0,0,c862a88db319c8eef1ca91fc74c77e313cc2ee14a94c70931d8815bb3a5c42 CVE-2025-0150,0,0,dca63b1abf1123a886706c853958072be5044d1c9ef23070ccdaffe267aedd34,2025-03-11T18:15:29.800000 CVE-2025-0151,0,0,ee31fb3c9dd590238f179f6f3a56f394ab47d251029c9adfaeba4c64aca0174c,2025-03-11T18:15:29.940000 CVE-2025-0154,0,0,50cc7e4c9f2877c13739ab14af2e76b9d150968a2d961bf547c3aad04539fac0,2025-04-07T14:18:49.830000 -CVE-2025-0158,0,1,e7434aebfcc067c6376f6166621f43b287cc7f77944ecab40bdadae87658d09d,2025-07-08T20:06:15.347000 +CVE-2025-0158,0,0,e7434aebfcc067c6376f6166621f43b287cc7f77944ecab40bdadae87658d09d,2025-07-08T20:06:15.347000 CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2cb,2025-02-28T19:15:36.243000 CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000 CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000 @@ -283476,7 +283477,7 @@ CVE-2025-0755,0,0,6d0dbadfda4a802c88ca940e4a533e59c6edc3de28616d86b3c764f16adc71 CVE-2025-0756,0,0,2f503184d01f58f956cb3d61accff5238661a48ad3360193623bab7de05b60ea,2025-04-17T20:21:48.243000 CVE-2025-0757,0,0,28a402bbfb840751157b78e725c0bb0f7484cb6d9360d77a653a5b5f45018749,2025-04-17T20:21:48.243000 CVE-2025-0758,0,0,727f4ea3aa4edd214a32da546eaa17a87b0da516ccecd5a176ebefb6a6f5ee34,2025-04-17T20:21:48.243000 -CVE-2025-0759,0,1,ebc345f802691100851cf41595f2f2834b96839f1882f416970a0f309a234e40,2025-07-08T20:05:43.337000 +CVE-2025-0759,0,0,ebc345f802691100851cf41595f2f2834b96839f1882f416970a0f309a234e40,2025-07-08T20:05:43.337000 CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000 CVE-2025-0762,0,0,03f57ccaa8cea227bf85d5172a4940cc05d8a50f3c1e62b0d5c2821514db1a51,2025-04-21T20:53:55.553000 CVE-2025-0764,0,0,77273f85eebda75df5c1b10c7e10eb8fa4db2d37828ed49e781e9b7366818024,2025-03-06T17:57:14.677000 @@ -284083,7 +284084,7 @@ CVE-2025-1495,0,0,eb77f981cabe4efbe3dd172718fb9875f01d80ca92253d5063810e79b3d445 CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000 CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000 CVE-2025-1499,0,0,820cdac28fea00c6c66bf92abe2a71a37dbc15ffa52790a34c8e360402089b44,2025-06-09T18:08:54.680000 -CVE-2025-1500,0,1,a57490084db91b200f535477abb76dfd0694b9bddbedb8d302ec142373cfaa34,2025-07-08T20:14:36.577000 +CVE-2025-1500,0,0,a57490084db91b200f535477abb76dfd0694b9bddbedb8d302ec142373cfaa34,2025-07-08T20:14:36.577000 CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000 CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000 CVE-2025-1504,0,0,0e09d380d5124abfd6e1c49748bbac5d04454a770e81e97825f6db7a4e571c1f,2025-03-24T18:27:10.747000 @@ -289954,6 +289955,7 @@ CVE-2025-27161,0,0,e2daf6461b200bca09da7de40a88d9c467451fb23187bd82948c062f9b5be CVE-2025-27162,0,0,b6d148bb543fa8cab2a2e14b6258dcc6bd02e7bfdcab4c409efcbc44ae504fb8,2025-04-28T16:48:39.727000 CVE-2025-27163,0,0,81f9699e5b11ea3842ffe9245801daecdb91eec74b0663ccf8976a83a7348e35,2025-04-28T16:48:36.780000 CVE-2025-27164,0,0,1e629a8207bea42d1358f357512432dc28b249a65ee22a83932b7b9ee7da9dde,2025-04-28T16:48:33.017000 +CVE-2025-27165,1,1,155ef390f669d6468b0102ed2c72d4380689dc4db0ed799a4f6608e79cc30933,2025-07-08T22:15:24.107000 CVE-2025-27166,0,0,5022e29cb2fc1ef4a7439717f59195861ec489ae1633e7bf61f51adda22ed1de,2025-04-28T17:05:20.700000 CVE-2025-27167,0,0,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000 CVE-2025-27168,0,0,f99984308c3ede254daed21e56e764d668905b50bfa211ed61f2d84fac69bffd,2025-03-31T20:06:08.030000 @@ -289995,6 +289997,7 @@ CVE-2025-2720,0,0,9ae0525d8f85a05348d1159e71fc380adf3a8b9852bd68a0d6d2a49136b12c CVE-2025-27200,0,0,2d55459379d67dca2d0eb314eb2150af648e2a6572b027ee78112b380b949b64,2025-04-18T14:40:40.313000 CVE-2025-27201,0,0,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3f33,2025-04-15T19:47:25.960000 CVE-2025-27202,0,0,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000 +CVE-2025-27203,1,1,4ac4588eba67d8607f05965f50eae40867fdeefa38cdc1f8b334d6ea289cf222,2025-07-08T22:15:24.717000 CVE-2025-27204,0,0,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000 CVE-2025-27205,0,0,b5a3be62757c631169ae6f30a73aa85000f349fef09deb61e50341f0061f73f9,2025-04-09T20:03:01.577000 CVE-2025-27206,0,0,d294d50f3906c6fb3fe785cd1596aadcf69ed2db2162953cfc8dc1288ebf1c78,2025-06-23T19:25:38.097000 @@ -291001,7 +291004,7 @@ CVE-2025-2924,0,0,035b342e4739e959d11faebc838ea9c953beab2ad201da68f4190d4779a05c CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000 CVE-2025-2926,0,0,ff1a3a2f56ae22a8e0a529aaa06dacf663678ee8cc312c431a50a47697b395d6,2025-04-17T14:31:21.250000 CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000 -CVE-2025-29267,0,1,abe653f4228073d944ad06d9561e97335968bb8e4e633bcb2a8d23869a1e2b07,2025-07-08T21:15:24.580000 +CVE-2025-29267,0,0,abe653f4228073d944ad06d9561e97335968bb8e4e633bcb2a8d23869a1e2b07,2025-07-08T21:15:24.580000 CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000 CVE-2025-29280,0,0,e7078c1a79e321c5221787040b502a3130fd227c8ba1ab7d76f6b02d2b9646b4,2025-06-24T15:19:45.883000 CVE-2025-29281,0,0,2c8d5f95d208357f48baeea9b566a4a0d55fc700bf49c9e1592597f8c42930b8,2025-06-24T15:17:53.360000 @@ -291544,6 +291547,7 @@ CVE-2025-30309,0,0,9f9cf0cdd20ae1c66398c9aa3e331adc1c37648db304a8a0df1f734799450 CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000 CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2c37,2025-05-14T14:28:01.833000 CVE-2025-30312,0,0,d8970b1c2c24348ac512ef795bb871415a9b852028c471c93ceff988db0fee4b,2025-07-08T18:15:27.830000 +CVE-2025-30313,1,1,6fe792e37fa789df49a338e7f0e30726bb6c2367c67fc5969480fd4a5fd962ce,2025-07-08T22:15:24.887000 CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000 CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000 CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000 @@ -292202,7 +292206,7 @@ CVE-2025-31019,0,0,0ce2758b0a8e888aab73b46b8932e361c63f6d92aba8710ee3abf24f3437a CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000 CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000 CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000 -CVE-2025-31022,0,1,3c26be2f841180e64a7edbab84a4dd7945f0b1186e4aceb174656c95f2ffab58,2025-07-08T20:15:25.710000 +CVE-2025-31022,0,0,3c26be2f841180e64a7edbab84a4dd7945f0b1186e4aceb174656c95f2ffab58,2025-07-08T20:15:25.710000 CVE-2025-31023,0,0,b2b6dfb4fff9d3759d0e8242dd466693eb363f1c7ae0a1b9a5f68a061dc5a13e,2025-04-09T20:02:41.860000 CVE-2025-31024,0,0,f13bb7564e2d955fe9c74ce3d5d82196ceac98ae0a3fb4b1ae7d33aec0a3a8af,2025-04-01T20:26:11.547000 CVE-2025-31025,0,0,053527fbe27001f119a974095c520ba6e0ed6e07579def4bdb1aa3af4361283c,2025-06-06T14:06:58.193000 @@ -294464,8 +294468,8 @@ CVE-2025-37099,0,0,067e991498d8cba31dd0ba2256a8ecf23acb321ae5ac75f861fdab474706e CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000 CVE-2025-37100,0,0,88b9ad7c7695f3a4670adb22647dcc8cbf099c03d5439646676dc63333e683a5,2025-06-12T16:06:39.330000 CVE-2025-37101,0,0,611db152f3bf6fbbe88c02a9c7c1f7f719963d9f48f127e010121dc26484aa06,2025-06-26T18:57:43.670000 -CVE-2025-37102,0,1,e957a98e57ec2a00ca989b07ab7fbd13a25eb1be41e0259645c0dc9244705a8b,2025-07-08T20:15:25.900000 -CVE-2025-37103,1,1,364730b69dc7866b08468b37b922a50992e97360b0853a65e19fa530811f5be5,2025-07-08T20:15:26.033000 +CVE-2025-37102,0,0,e957a98e57ec2a00ca989b07ab7fbd13a25eb1be41e0259645c0dc9244705a8b,2025-07-08T20:15:25.900000 +CVE-2025-37103,0,0,364730b69dc7866b08468b37b922a50992e97360b0853a65e19fa530811f5be5,2025-07-08T20:15:26.033000 CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000 CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000 CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000 @@ -296099,9 +296103,9 @@ CVE-2025-43579,0,0,7eef94019923cdf7523c797919be9d42cfebb3f84c4aac09a8b6180f71a5f CVE-2025-4358,0,0,d3722602427908cbcfc83920c5bb8690b3edbc0005f687a90c096634472fae17,2025-05-15T07:15:50.917000 CVE-2025-43580,0,0,296c99ebc23f32f4dd18a945cf6ad3e76fcf085e153a660b50b07de56bba031a,2025-07-08T17:15:35.940000 CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc15f2,2025-06-12T16:06:29.520000 -CVE-2025-43582,1,1,0fcb5be1fc5bfa88b29818894fe3f529f2ee3c6b91f295fe34d80d4997bfe8e2,2025-07-08T21:15:25.387000 -CVE-2025-43583,1,1,76b6d2c2d6bee66ce37350a2770772b1b6e1d8c5d198df6224bd73bfc02148f2,2025-07-08T21:15:25.543000 -CVE-2025-43584,1,1,a0c8e034915966694605906dbd858c64675bcbe4ecadf29fb3d8e7c6ec4c7468,2025-07-08T21:15:25.690000 +CVE-2025-43582,0,0,0fcb5be1fc5bfa88b29818894fe3f529f2ee3c6b91f295fe34d80d4997bfe8e2,2025-07-08T21:15:25.387000 +CVE-2025-43583,0,0,76b6d2c2d6bee66ce37350a2770772b1b6e1d8c5d198df6224bd73bfc02148f2,2025-07-08T21:15:25.543000 +CVE-2025-43584,0,0,a0c8e034915966694605906dbd858c64675bcbe4ecadf29fb3d8e7c6ec4c7468,2025-07-08T21:15:25.690000 CVE-2025-43585,0,0,6df4e3a17a9131e321c50e0e04cd2c0725f7cea66af401580d79eb104580f09e,2025-06-23T19:22:41.517000 CVE-2025-43586,0,0,bf57beb4510c3c1c98308dc5ea38415d9786647d178b76150399e4110e62a6d4,2025-06-23T19:22:26.633000 CVE-2025-43587,0,0,4594025616f20b82c6b239fc92b3effb5293c92268387236cfe5ca3122042a7c,2025-07-08T17:15:36.137000 @@ -296109,7 +296113,10 @@ CVE-2025-43588,0,0,18f5e59b51717e1346fca3045898f24af5f456d77d491f9c5377ad6cd7d6d CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000 CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000 CVE-2025-43590,0,0,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000 +CVE-2025-43591,1,1,6830c3e0d4762c9c103fc4598fee898be639970882dd0b7f06260439773a20ac,2025-07-08T22:15:25.050000 +CVE-2025-43592,1,1,467a87e9b3d77fb41c1440a2b0fddf6ff8c9a732f7fd4c67296c7026a8b240d0,2025-07-08T22:15:25.217000 CVE-2025-43593,0,0,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000 +CVE-2025-43594,1,1,648b3f694ce768ed9e4c2e3618b18b5cc3b87284168846e836a5c621bf849db3,2025-07-08T22:15:25.397000 CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000 CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000 CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000 @@ -297335,8 +297342,12 @@ CVE-2025-47093,0,0,d041bb92bf35803d912e46cc3786fe6194a9f70224953010e6cfbbb689495 CVE-2025-47094,0,0,2b1e141c81f037a004986a2a6feda2400217e4605e2e7cbf768fa440e99bdb14,2025-06-16T14:47:48.470000 CVE-2025-47095,0,0,6692e6dca71a9ad0e88f0bb3f86803201fe675c9243f60adf2c9cc2e0a673a42,2025-06-11T00:15:27.457000 CVE-2025-47096,0,0,e36e469f5850085f588b67839209d7a2406a67c09a4e10c7e0b375d32031e9be,2025-06-16T14:47:44.727000 +CVE-2025-47097,1,1,a32b4216bd3ba5587e5a8fb6bc2b5ce1dc4b740ce18afbf9eefdd622686b418f,2025-07-08T23:15:23.687000 +CVE-2025-47098,1,1,e07334de3d0b5e6f86633570d8041dc6af3c394211803325d190792c71bf7349,2025-07-08T23:15:23.850000 +CVE-2025-47099,1,1,ffb43766404e7cd47c3534f5792f8695dde3e0c2a232f081041fbec936aa6e9a,2025-07-08T23:15:24.013000 CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000 CVE-2025-47102,0,0,718a80105b6565fee66f0014accca7ba51fb51a15c80dbabb0b54b0424234e8d,2025-06-11T00:15:27.530000 +CVE-2025-47103,1,1,0f958201632760b4bb1e0a74fe0514cd2c2c24ff9fae758401712bc4feb220f1,2025-07-08T22:15:25.553000 CVE-2025-47104,0,0,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000 CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000 CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000 @@ -297352,9 +297363,26 @@ CVE-2025-47114,0,0,d163492e89575318359525e72632c9c943e0e758e06a293f69c2dae9facfa CVE-2025-47115,0,0,1bbfc8222a0849d3f615770e73bae226a0c8265c4bce8e1cd9a585d4ca4685bc,2025-06-16T14:47:31.267000 CVE-2025-47116,0,0,137a8d5062435ed03fec8e94fcca5accb2b2cd00d042dd35a0ed6a26a9dac507,2025-06-16T14:47:27.360000 CVE-2025-47117,0,0,ad3df63509d2764d93688d9d9f1a9b2e1a2a39de970d2426a955e41c43e223e3,2025-06-16T14:47:22.160000 +CVE-2025-47119,1,1,f0c8fd41e81c88d1be07c0092de74bc846c65420be78c31a437a33493dfc2c19,2025-07-08T23:15:24.173000 CVE-2025-4712,0,0,655cc7933dcbfa8299ca016577dc2e95743bc96639079a5634fc2b1e9ba99048,2025-05-27T14:10:29.530000 +CVE-2025-47120,1,1,2867370570756813db7eb03adca268c3b4b39beb4e965ed18aa045454643cdb8,2025-07-08T23:15:24.337000 +CVE-2025-47121,1,1,95929ef04ae37891c67ec941c0f1bdc68a55462f6f04ae4c9d7480897241edef,2025-07-08T23:15:24.487000 +CVE-2025-47122,1,1,bc428eaaea677bf9f4191c6c900cfa0ec6aeca3bd6b744bdbda6b22fdaf1813b,2025-07-08T23:15:24.640000 +CVE-2025-47123,1,1,149447a8d580ca6b8001eacc5c19def615fc1b3c0e12a79544af06138d927b01,2025-07-08T23:15:24.797000 +CVE-2025-47124,1,1,2149c33e8d18c41701e1486795e64efec9f9a70061ecfc8ea77bcd7ae7ce0efe,2025-07-08T23:15:24.953000 +CVE-2025-47125,1,1,df5fd29003f5ab9e7a945de707a95a6a022032c0606e4f254098df45e3106891,2025-07-08T23:15:25.117000 +CVE-2025-47126,1,1,f6795b756fc831284dc88431ce3ead81a771ae3353bb117ba86a4d5eb30432e4,2025-07-08T23:15:25.280000 +CVE-2025-47127,1,1,b4f61c867c13bed502ebf00cc063fc2ebbd2d6f10461d4efb4ffb8602c85cad4,2025-07-08T23:15:25.443000 +CVE-2025-47128,1,1,611731a0747ad4703b5d747b06c39f1f3db635f3b11ed6538df8b7c543242e3b,2025-07-08T23:15:25.593000 +CVE-2025-47129,1,1,e277e77d0c0c2b7c545a2d102ffa357116182e6b57b9b6154b9277fc7af8805b,2025-07-08T23:15:25.757000 CVE-2025-4713,0,0,07deb6148a7b9c61da4f7b5f9679e8b0482f4bcf7e19d344fe5ec15e4b57121a,2025-05-27T14:10:47.117000 +CVE-2025-47130,1,1,80f775b176e0eec4c95abb50abc91cde6c7e1e969f05fc7b5dedaf530f78fdc9,2025-07-08T23:15:25.910000 +CVE-2025-47131,1,1,025bd12695c59650091129dd599a7865168286a4f306798e3c71b00fea30ee17,2025-07-08T23:15:26.073000 +CVE-2025-47132,1,1,ad5b20a6a03e2421e916bacae6c502b98cf21b20c97c7f22f6ca631de66efd15,2025-07-08T23:15:26.223000 +CVE-2025-47133,1,1,960d61abfd9e907b69fe6e9fe40a3328a119e9f5e7b5ec858013b61e6b9860d0,2025-07-08T23:15:26.390000 +CVE-2025-47134,1,1,bfd73800cd1b3d75d725db349716aaa75033a2ff8f0d93841f81712003f3d4c0,2025-07-08T22:15:25.703000 CVE-2025-47135,0,0,108cc60d1bd33d5a8335a3fa56d5ec5ebbf28658b48fd8c4fd7062bb198c651c,2025-07-08T18:15:29.440000 +CVE-2025-47136,1,1,fd3c0672f300fcfaca803a507eed7620af44dc5f993b80653c0e8134a3dfcf86,2025-07-08T22:15:25.857000 CVE-2025-4714,0,0,ea07a9f4689461c2a8f9423bf631226225cddda92ad9e10d96306967ff6a2ec2,2025-05-27T14:10:53.560000 CVE-2025-47149,0,0,2734c76650c27423981403171e8ba8344bf60f54ddfbffa7869e6a96d7489a05,2025-05-23T15:54:42.643000 CVE-2025-4715,0,0,9a489c97c9d40720bd1d4e2feec8573f21fedd878a5e031a38c9126d1f627a14,2025-05-27T14:11:05.693000 @@ -297458,7 +297486,7 @@ CVE-2025-47418,0,0,bdeebdcffdfcfa25a9c3fca2d88b0ef86304dd2bce949cfa926a70785bd61 CVE-2025-47419,0,0,fc776138a91094c8a7b58fa141974765a03e9710eddfe22ed3c577752b353134,2025-05-07T14:13:20.483000 CVE-2025-4742,0,0,ee2f2c0b14e93f0d64b20a7c52ca41f5d96685f95f979ed4c5b911d5d1c284ab,2025-05-16T14:42:18.700000 CVE-2025-47420,0,0,c1bc73f65501af2caba4c7542063041141320145e66b4cd312289b27bba5f98a,2025-05-07T14:13:20.483000 -CVE-2025-47422,0,1,2ceec0fcd5294140336881cd4df1e1e7adf34185c8fa15a129a05fa829fc1430,2025-07-08T21:15:25.947000 +CVE-2025-47422,0,0,2ceec0fcd5294140336881cd4df1e1e7adf34185c8fa15a129a05fa829fc1430,2025-07-08T21:15:25.947000 CVE-2025-47423,0,0,6836a6f986120cb2e164a5663178ae0fd396b9a71521a1bcfcb70d3454021365,2025-05-08T14:39:09.683000 CVE-2025-47424,0,0,71d29b752922eab2f18ed784453e2b935bfb9c4385e21b85c68c2b1d9613d539,2025-05-12T17:32:32.760000 CVE-2025-4743,0,0,f4e1132d4a1d65e64cd42fcffb62ca910ad40af2c0b6ee93feb69f0c1fc24629,2025-05-28T14:27:10.833000 @@ -298364,11 +298392,11 @@ CVE-2025-48912,0,0,4848d33489117f53b877c948399935df619e976eec472273191f1ca26ec72 CVE-2025-48914,0,0,da6bad0c4d0e6121a9d50700e2fc20599407401d3911e3bb2477eba8adbe7eea,2025-06-18T15:57:07.227000 CVE-2025-48915,0,0,d0d154b27b6b38bf355906ab2c27cbf671e5447a4489ef6508823c1eb32aeead,2025-06-18T15:57:25.617000 CVE-2025-48916,0,0,064370efde96850d30de939e26f598a08846fb12f52793745ff31da22fd4e34e,2025-06-16T12:32:18.840000 -CVE-2025-48917,0,1,434e69724c070443ac8288e8aa658f0f4853821345839fd8bd02ff078d9cc3b9,2025-07-08T20:35:15.717000 -CVE-2025-48918,0,1,79698f3fff42cfb0ecf3bc2277a2ef1598c620ded581a343b6534dcfe7129331,2025-07-08T20:34:54.967000 -CVE-2025-48919,0,1,1e532881ce312918fe4e6d20ceffc6d8e9527ae6c7eb25332b0b02c97bf31b78,2025-07-08T20:35:27.190000 +CVE-2025-48917,0,0,434e69724c070443ac8288e8aa658f0f4853821345839fd8bd02ff078d9cc3b9,2025-07-08T20:35:15.717000 +CVE-2025-48918,0,0,79698f3fff42cfb0ecf3bc2277a2ef1598c620ded581a343b6534dcfe7129331,2025-07-08T20:34:54.967000 +CVE-2025-48919,0,0,1e532881ce312918fe4e6d20ceffc6d8e9527ae6c7eb25332b0b02c97bf31b78,2025-07-08T20:35:27.190000 CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000 -CVE-2025-48920,0,1,4d517335088069cf3700512d78281b9ede8e66d945ac50e623bd1c1b75d1a8be,2025-07-08T20:35:36.687000 +CVE-2025-48920,0,0,4d517335088069cf3700512d78281b9ede8e66d945ac50e623bd1c1b75d1a8be,2025-07-08T20:35:36.687000 CVE-2025-48921,0,0,bf8abbd438522ab19b03d1fef94a34f38eef0e3ce6985bd31edb7d679cf6c776,2025-06-26T18:57:43.670000 CVE-2025-48922,0,0,5a39c3a2314efaec349abc0bfa7dca0f34477df009f53b13f84a3980bc0a5a03,2025-06-26T18:57:43.670000 CVE-2025-48923,0,0,1b4953164a87b46a282bdab4066b15729f967660cf7b30e28abeb78958c86467,2025-06-26T18:57:43.670000 @@ -298739,23 +298767,35 @@ CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0d CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000 CVE-2025-49520,0,0,8baebc35523945bd35de07d42fda2554b9e130dd2f1677e6b4b5b1fa3ba7d6b1,2025-07-03T15:14:12.767000 CVE-2025-49521,0,0,2e21ab9896c671b2641a1fd6799eb79dcb95d338ad91c2250b20c876c8af9e40,2025-07-03T15:14:12.767000 -CVE-2025-49535,1,1,4443f64e5ad22cd9ee3abcaa1fe1818f3b1690983d77cef65cdcb6cddc715e43,2025-07-08T21:15:26.113000 -CVE-2025-49536,1,1,b380e572639396b81e564d2d10ddf131d4e1df6e5fd78c52d239c7102a1ed20c,2025-07-08T21:15:26.280000 -CVE-2025-49537,1,1,98a6d9e0cabab3646c697b2636d51d9640ee4d36347a350f3bf1a35dad5b7ddc,2025-07-08T21:15:26.437000 -CVE-2025-49538,1,1,b08abdfa01783bdedde5cbd2d93605684aca3f32a36dc12c60a269d3e7096a9f,2025-07-08T21:15:26.597000 -CVE-2025-49539,1,1,5fda7967846294efa188d04a661d755795244ba86353eae7eca35ff277e34f09,2025-07-08T21:15:26.757000 +CVE-2025-49524,1,1,cf0534c507f7c5f47e05216df0397a22f256128f09d71caca35014be7037ec6d,2025-07-08T22:15:26.010000 +CVE-2025-49525,1,1,c043b565919129e48845c4164bc9fa3614b7d316f768d685dfd4ef1ea55eb1cc,2025-07-08T22:15:26.183000 +CVE-2025-49526,1,1,d9c6502c00f943f1d4ed6e7a11c47e0cdd69ba38c45e1c33442d9c9d0106560f,2025-07-08T22:15:26.340000 +CVE-2025-49527,1,1,0f96b6fe097a0e4a381adcc29941fd8e306ba564f7a3cbb4eb989c540f66e1a9,2025-07-08T22:15:26.500000 +CVE-2025-49528,1,1,c04d3258f8d6e7db1cf2d51a6a086de82dab581ba8e198e5e5036134288e141a,2025-07-08T22:15:26.657000 +CVE-2025-49529,1,1,6c9158651c8d6f73f11c9fb70b3f2c1abba0d1b38edecc4c755cccbb6d93abb6,2025-07-08T22:15:26.810000 +CVE-2025-49530,1,1,957bf34b474fba5de280895f12e0abfd24e823b5bfc9e19f5f13dd3aaede4674,2025-07-08T22:15:26.960000 +CVE-2025-49531,1,1,321058713aac28893cebf8dd55502a6ac06a3eecb9af13ea3373ffa95c1dfbdc,2025-07-08T22:15:27.113000 +CVE-2025-49532,1,1,395fe09750e5ab0de85f88a8bb0d7ddcacff97a4e91645ba5dd12d1822e76bb0,2025-07-08T22:15:27.273000 +CVE-2025-49533,1,1,23d6b9fdd252390f8881e6f53f2b7cb4ede566acad453771a83c56bc08c8bfd1,2025-07-08T22:15:27.423000 +CVE-2025-49534,1,1,88b71a5cc34e50c8fd5a55773bd40159fc244c03ace46b3b6241795308bce314,2025-07-08T22:15:27.587000 +CVE-2025-49535,0,0,4443f64e5ad22cd9ee3abcaa1fe1818f3b1690983d77cef65cdcb6cddc715e43,2025-07-08T21:15:26.113000 +CVE-2025-49536,0,0,b380e572639396b81e564d2d10ddf131d4e1df6e5fd78c52d239c7102a1ed20c,2025-07-08T21:15:26.280000 +CVE-2025-49537,0,0,98a6d9e0cabab3646c697b2636d51d9640ee4d36347a350f3bf1a35dad5b7ddc,2025-07-08T21:15:26.437000 +CVE-2025-49538,0,0,b08abdfa01783bdedde5cbd2d93605684aca3f32a36dc12c60a269d3e7096a9f,2025-07-08T21:15:26.597000 +CVE-2025-49539,0,0,5fda7967846294efa188d04a661d755795244ba86353eae7eca35ff277e34f09,2025-07-08T21:15:26.757000 CVE-2025-4954,0,0,1842fa5885eb88cf4e938c25f5c28a2b06178d338bd8f50c89b12e7a73a12077,2025-07-02T16:11:11.290000 -CVE-2025-49540,1,1,c0f8a5784412a376a14b9c297ed0c569b0d39ae366bc5bb925dde5d6a01e0996,2025-07-08T21:15:26.907000 -CVE-2025-49541,1,1,1e19202b7a7ab75211048ef54de3907587736ac10b5b45d74f3a423939a267fa,2025-07-08T21:15:27.060000 -CVE-2025-49542,1,1,252b318c939d04f76bf7c9b9fc7714ebed84e3f6d2c8374e91ef23539642e079,2025-07-08T21:15:27.213000 -CVE-2025-49543,1,1,6b2d9ef391d0cf9390c3ad2f98aef9a57cd7931469ac096bc8aa17967786bb76,2025-07-08T21:15:27.360000 -CVE-2025-49544,1,1,26c716eecb4e1c9ba05029057d0f31e3f5763e1b672dd0f597b5b6a8856f0cad,2025-07-08T21:15:27.520000 -CVE-2025-49545,1,1,303d97821b643af9eaea654a826f753b85097ef47b66877b2f2f77b46235cdc5,2025-07-08T21:15:27.670000 -CVE-2025-49546,1,1,93a0c78368822ac42c11d49fca9c399b41ceb17cb7b83c0358989200a549859a,2025-07-08T21:15:27.820000 +CVE-2025-49540,0,0,c0f8a5784412a376a14b9c297ed0c569b0d39ae366bc5bb925dde5d6a01e0996,2025-07-08T21:15:26.907000 +CVE-2025-49541,0,0,1e19202b7a7ab75211048ef54de3907587736ac10b5b45d74f3a423939a267fa,2025-07-08T21:15:27.060000 +CVE-2025-49542,0,0,252b318c939d04f76bf7c9b9fc7714ebed84e3f6d2c8374e91ef23539642e079,2025-07-08T21:15:27.213000 +CVE-2025-49543,0,0,6b2d9ef391d0cf9390c3ad2f98aef9a57cd7931469ac096bc8aa17967786bb76,2025-07-08T21:15:27.360000 +CVE-2025-49544,0,0,26c716eecb4e1c9ba05029057d0f31e3f5763e1b672dd0f597b5b6a8856f0cad,2025-07-08T21:15:27.520000 +CVE-2025-49545,0,0,303d97821b643af9eaea654a826f753b85097ef47b66877b2f2f77b46235cdc5,2025-07-08T21:15:27.670000 +CVE-2025-49546,0,0,93a0c78368822ac42c11d49fca9c399b41ceb17cb7b83c0358989200a549859a,2025-07-08T21:15:27.820000 +CVE-2025-49547,1,1,9f057608fd5bded1b3e3d881b8d5b33b5948ad193dc915409d3273384c3360a2,2025-07-08T22:15:27.737000 CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000 CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000 CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000 -CVE-2025-49551,1,1,b2def63370ea0a0fa1eb0ceec3b13a45083199872407356fbafaa99b42f4747e,2025-07-08T21:15:27.970000 +CVE-2025-49551,0,0,b2def63370ea0a0fa1eb0ceec3b13a45083199872407356fbafaa99b42f4747e,2025-07-08T21:15:27.970000 CVE-2025-49574,0,0,ec211dbe5543652a4df81f232ea6a683a4d467fc93142407aa7003d8d8ff4016,2025-06-23T20:16:21.633000 CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000 CVE-2025-49576,0,0,d91dc4671dcd271f2349061a8890351137f780e1115b96e716a0a31c8aba01ac,2025-06-16T12:32:18.840000 @@ -299665,7 +299705,7 @@ CVE-2025-53338,0,0,69ee0c5b640fcd72e43f5a3a6d7505b4ccd5499b6d733162f15f39655cb80 CVE-2025-53339,0,0,955bc6b5359aed429b44d347615d0e1318a1b809ec1e3579e3ed2353be810e81,2025-06-30T18:38:23.493000 CVE-2025-5334,0,0,fb14475e980fb397de4901b9efdcaa30993615e4c74780c0502ee0c491e8e5cb,2025-07-02T17:31:56.563000 CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000 -CVE-2025-53355,1,1,8d35bab09217d655776045296c71bfb70dc5971d57f3d2661db16dadac0d3714,2025-07-08T21:15:28.120000 +CVE-2025-53355,0,0,8d35bab09217d655776045296c71bfb70dc5971d57f3d2661db16dadac0d3714,2025-07-08T21:15:28.120000 CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000 CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000 CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000 @@ -299703,7 +299743,7 @@ CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29a CVE-2025-53473,0,0,a98e9bef8a3e8614654fd61fe5e312266f4052bbcda22460250a3d6a497eb2e1,2025-07-08T16:18:34.923000 CVE-2025-53478,0,0,aa7b2381d7181ee2b89b1383c51d82730ebb38c46cf0997958e21fb414371fe5,2025-07-08T16:18:34.923000 CVE-2025-53479,0,0,d40fec0cee63feb67a3f9256754b9dab9198b4d5af73ca36d7772139873aa11f,2025-07-08T18:15:40.387000 -CVE-2025-53480,0,1,d8383875b2422d51193c6751343fc73f1fb8675714156878ade9b707d83c0eb9,2025-07-08T21:15:28.227000 +CVE-2025-53480,0,0,d8383875b2422d51193c6751343fc73f1fb8675714156878ade9b707d83c0eb9,2025-07-08T21:15:28.227000 CVE-2025-53481,0,0,6fc1e0a87cba085ed024fc5b3374d45e0211ca730bf92722cc171d880a81905d,2025-07-08T18:15:40.500000 CVE-2025-53482,0,0,1920f2634050742befb0e985247a8637f5baaf6ae1103ac41377c2c70cf4dc47,2025-07-08T18:15:40.767000 CVE-2025-53483,0,0,5257b2ac88a5fcf2d69cee51164cf061fc82bd54ca17911d88499bc110778167,2025-07-08T18:15:40.950000 @@ -299719,11 +299759,11 @@ CVE-2025-53491,0,0,6b3662c2831fdd8c79ded4454ee2035fa60f94a03054090afb7fd7e68c185 CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000 CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000 CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000 -CVE-2025-53495,0,1,56848ea1597fdf3921861d57f3d3c0df814f7e808f9a8ee638b3d3ead6ba1810,2025-07-08T20:15:30.183000 -CVE-2025-53496,0,1,64ad5663450c608739e4f92f49cf26be5e012b03208714c07709c5ba4201bd44,2025-07-08T20:15:30.430000 +CVE-2025-53495,0,0,56848ea1597fdf3921861d57f3d3c0df814f7e808f9a8ee638b3d3ead6ba1810,2025-07-08T20:15:30.183000 +CVE-2025-53496,0,0,64ad5663450c608739e4f92f49cf26be5e012b03208714c07709c5ba4201bd44,2025-07-08T20:15:30.430000 CVE-2025-53497,0,0,5eae136538b70c3c37a94d0e58a284bca8a286c4bb1c1df40f1d02cade0ee419,2025-07-08T16:18:34.923000 -CVE-2025-53498,0,1,cc8925afff59b0ad4b7c3e01a9d4d860c7090b508312b3cd6c9cd263d16d81df,2025-07-08T21:15:28.380000 -CVE-2025-53499,0,1,97e7adcc1a6a9f2f0df5015b748dd370860d034cdf43809e446427c804cca5df,2025-07-08T20:15:30.623000 +CVE-2025-53498,0,0,cc8925afff59b0ad4b7c3e01a9d4d860c7090b508312b3cd6c9cd263d16d81df,2025-07-08T21:15:28.380000 +CVE-2025-53499,0,0,97e7adcc1a6a9f2f0df5015b748dd370860d034cdf43809e446427c804cca5df,2025-07-08T20:15:30.623000 CVE-2025-53500,0,0,6bf8ca33713f3a2bab75c61f0f766e7ebebde783ecb1ccdda91000f21a8986cf,2025-07-08T16:19:11.700000 CVE-2025-53501,0,0,ccac602c786f22315db263303b00facd2536cbcd4bbc6d4d87bf200450bbda9d,2025-07-08T16:19:11.700000 CVE-2025-53502,0,0,5a7035089ea6976dad62bf0b0d470894d525c57cb053c618d3c57707f23fd14d,2025-07-08T16:19:11.700000 @@ -299744,6 +299784,7 @@ CVE-2025-53539,0,0,5db39fcd0a7210d0be83b7c2d14e7c8ed3f3b273c7210a57205be51f0a6b1 CVE-2025-53540,0,0,68f0d19008b8f949cf7cbae53e1f6ef67fca39bb0fc5628cd655d505d311b69c,2025-07-08T16:18:34.923000 CVE-2025-53543,0,0,da4e1b5cf6cb8007cd6dfd1396fc489f3840d88a4e59fc523fdbc4c83d5fc208,2025-07-08T16:18:34.923000 CVE-2025-53545,0,0,ef3d0455098abbefc8b277f85bd071e32e2b46fb49dca2b74733aee634f2df15,2025-07-08T16:18:14.207000 +CVE-2025-53547,1,1,0603f19d53a4e8e1ee41784cd64f1b6377de65c88b39bed5a19368f091eb7c70,2025-07-08T22:15:27.897000 CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000 CVE-2025-53566,0,0,454fc69172044556d46b17e70adb6745e5c6362d217f0ee325fd72c5ff2824d8,2025-07-08T16:18:53.607000 CVE-2025-53568,0,0,ec672fa14438849d4042331d8f520ecf08d3b5cc6d344f82d58d26ad189f71b5,2025-07-08T16:18:53.607000 @@ -300673,7 +300714,7 @@ CVE-2025-6543,0,0,614be473b1a9f0b696f8665a5ce20ebb99b6c34c213be6f11e91a24c2a2ce2 CVE-2025-6545,0,0,232265ccc6fe056c6abf53601342de9afd636906f2fd3b22c8fe97e99accaff8,2025-06-23T20:16:21.633000 CVE-2025-6546,0,0,e2ccb0f36404155cf63065e6218ff7146480ba7d5ad20b9847888ed82aa12363,2025-07-08T11:34:27.020000 CVE-2025-6547,0,0,9faf016e4cd0d979f6fd378ab40d2ecc76b2956dd06a9026d16b0df65d7d2aad,2025-06-23T20:16:21.633000 -CVE-2025-6550,0,0,c0a691cea8a5ed699b0d12b82357599196c16b195f2af32ef4c55625a42b68d0,2025-07-07T15:38:38.413000 +CVE-2025-6550,0,1,89e239136c37d0091ac7da31fce424150e754df9694a35b76fceef47cee0376e,2025-07-08T22:15:28.053000 CVE-2025-6551,0,0,2a94174e2614ca3546b6a5e525dcaf472420d11762377d8f50c13a66a36f8364,2025-07-08T14:26:00.507000 CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000 CVE-2025-6554,0,0,890362c519a4357d98514f62cd39fc9e4bb37403cd00a1b3ef610614d19dbf03,2025-07-03T14:36:33.257000 @@ -300802,6 +300843,7 @@ CVE-2025-6752,0,0,d618339d30498ab434c65ab8e70ead8372a7351acdadb43706f579edd48b3c CVE-2025-6753,0,0,3897c99aad9d809fc80328b995708f5bc4da9d5705cbec93e88e8647b45eee72,2025-06-30T18:38:48.477000 CVE-2025-6755,0,0,2ed0f7f54c600ed4e147859a7a6dccd680b8f9e751ace8296b2fc7b8585c8e1d,2025-07-07T14:37:41.387000 CVE-2025-6756,0,0,0cfdb95abe834ccf814ebb67236819ce98902f5c812431ef066dbba054d03826,2025-07-03T15:14:12.767000 +CVE-2025-6759,1,1,fd5ad8950faaf00037797969f812bda1b912165b72aa82116a14ba1f59189b19,2025-07-08T22:15:28.213000 CVE-2025-6761,0,0,e4aa62f203d4ba34beb7bc7552005e1ee7d628b1642e253cda9ca26ecfa6cb7f,2025-06-30T18:38:48.477000 CVE-2025-6762,0,0,75cd4b1572c25c8bfa181120ae91b7aedff91bf82d0f669f47b2f3f4fec5cad2,2025-06-30T18:38:48.477000 CVE-2025-6763,0,0,79011f757887077a09a36e14edcb0426409f6ce627f1762247315cb51e05c1de,2025-06-30T18:38:48.477000 @@ -300963,8 +301005,8 @@ CVE-2025-6962,0,0,f65c5ea7b99373b1a9855dc70c185d85075c1892627adaf80072b361308a0e CVE-2025-6963,0,0,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000 CVE-2025-6995,0,0,7b13a5a39a513866404553a42360b13c7cd18804a396552daf573ce610d37414,2025-07-08T16:18:14.207000 CVE-2025-6996,0,0,bb768e06b01467d03128b27855e07bfbcba0271eecc64a64b2276cf474cfed86,2025-07-08T16:18:14.207000 -CVE-2025-7030,1,1,52e23f1ceb13513064982b9c04a299b3420b12b28bdc1364165ec4105339fedf,2025-07-08T21:15:28.773000 -CVE-2025-7031,1,1,87dcf3ead2d6e93587306ac125db0b07ac03ac33faf58797d3a3b1839c361f89,2025-07-08T21:15:28.907000 +CVE-2025-7030,0,0,52e23f1ceb13513064982b9c04a299b3420b12b28bdc1364165ec4105339fedf,2025-07-08T21:15:28.773000 +CVE-2025-7031,0,0,87dcf3ead2d6e93587306ac125db0b07ac03ac33faf58797d3a3b1839c361f89,2025-07-08T21:15:28.907000 CVE-2025-7037,0,0,b07b90cf71f9637ef298c4a50f0e88d414ddf0e08711f7a76696405dc6fcd56c,2025-07-08T16:18:14.207000 CVE-2025-7046,0,0,59780b11937d03ed4ccc5b0e229eb16ce78f2772f010122dcf4771e66748fb6e,2025-07-08T16:18:53.607000 CVE-2025-7053,0,0,fd9c537260c66ae5a5eee80d5c89e14a4b3e6e9926df22af4c5ebd179b63f858,2025-07-08T16:18:53.607000 @@ -301092,10 +301134,14 @@ CVE-2025-7188,0,0,4c3d913ed14de1eb57706a8dc50d9a2e698e5e43a5bc5bbfb22fa6bad237b8 CVE-2025-7189,0,0,8f84df0755649db6f2e8f138025fbb73232ebd734527af4887f6a4f01e491132,2025-07-08T18:15:46.273000 CVE-2025-7190,0,0,75c864e411e3c9537f814458631c6d27ebf0955383e9bfa84c59e49ab369e25a,2025-07-08T19:15:43.943000 CVE-2025-7191,0,0,19c40554d9df3cc04931ac06e93e1a6ee08ad5c50b064f50507dda485184ff15,2025-07-08T19:15:44.300000 -CVE-2025-7192,1,1,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee6c,2025-07-08T20:15:30.830000 -CVE-2025-7193,1,1,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000 -CVE-2025-7194,1,1,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000 -CVE-2025-7196,1,1,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000 +CVE-2025-7192,0,0,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee6c,2025-07-08T20:15:30.830000 +CVE-2025-7193,0,0,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000 +CVE-2025-7194,0,0,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000 +CVE-2025-7196,0,0,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000 +CVE-2025-7197,1,1,d7ef2bbbca6a098b30626d655580ae51f3bb02749fdfc95787b7456aca1ba445,2025-07-08T22:15:28.363000 +CVE-2025-7198,1,1,63b79c707b5bfce7c46214c79d7862e8376d7eb74cbc05a4724b43eff8a718c0,2025-07-08T22:15:28.563000 +CVE-2025-7199,1,1,b0a8250b4d336e166905e4bc2ac946445847a87b58bca02c2f72af4f009a69fd,2025-07-08T23:15:26.547000 +CVE-2025-7200,1,1,3128d4b4efd12d5fee611c128232b2629be04d055967f1d11cd5875056d136cd,2025-07-08T23:15:26.757000 CVE-2025-7259,0,0,8fd7864e8f7fb6c249652178c4014f15a5857d3e35a24f0168719b78d426bcb5,2025-07-08T16:18:34.923000 CVE-2025-7326,0,0,7483fa577d73a18bc380df3b53d59526c96cf483de8c4617271f38405405a76d,2025-07-08T16:18:14.207000 CVE-2025-7327,0,0,a0fb7d73224d0b20e5509ef1c0447ce978b71b86006dd59d1e903714c73ecb3c,2025-07-08T16:18:14.207000