Auto-Update: 2025-06-17T16:00:20.396590+00:00

This commit is contained in:
cad-safe-bot 2025-06-17 16:04:01 +00:00
parent 2590aff179
commit 5841da8d89
178 changed files with 9696 additions and 532 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-13878",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-05T08:15:41.840",
"lastModified": "2024-11-21T05:02:03.590",
"lastModified": "2025-06-17T15:15:33.890",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-26624",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-02T22:15:07.837",
"lastModified": "2024-11-21T05:20:09.577",
"lastModified": "2025-06-17T15:15:34.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-25117",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:09.213",
"lastModified": "2024-11-21T05:54:23.110",
"lastModified": "2025-06-17T14:15:26.197",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47072",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-31T21:15:08.440",
"lastModified": "2024-11-21T07:31:27.933",
"lastModified": "2025-06-17T15:15:35.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25295",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-17T03:15:07.743",
"lastModified": "2024-11-21T07:49:23.760",
"lastModified": "2025-06-17T15:15:35.367",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25365",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T22:15:08.410",
"lastModified": "2024-11-21T07:49:27.247",
"lastModified": "2025-06-17T15:15:35.540",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,20 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27001",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T22:15:08.463",
"lastModified": "2024-11-21T07:52:10.427",
"lastModified": "2025-06-17T14:15:27.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32877",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-01-02T03:15:07.980",
"lastModified": "2024-11-21T08:04:15.263",
"lastModified": "2025-06-17T15:15:35.757",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33538",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-07T04:15:10.623",
"lastModified": "2025-06-17T01:00:02.367",
"vulnStatus": "Modified",
"lastModified": "2025-06-17T15:54:04.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -189,28 +189,41 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
"url": "https://web.archive.org/web/20230609111043/https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"Broken Link"
]
},
{
"url": "https://web.archive.org/web/20230609111043/https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.tp-link.com/us/support/faq/3562/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-36236",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T22:15:37.473",
"lastModified": "2024-11-21T08:09:26.313",
"lastModified": "2025-06-17T15:15:35.950",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40284",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T04:15:09.200",
"lastModified": "2024-11-21T08:19:08.287",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:08:47.313",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,117 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:supermicro:x11ssm-f_firmware:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "20BC3CF1-B926-40C7-A22F-246B2DF85154"
}
]
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": false,
"criteria": "cpe:2.3:h:supermicro:x11ssm-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC19D26-080D-4B5A-A41C-253D00036608"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:supermicro:x11sae-f_firmware:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6ECA00-0751-453C-AD3C-3092454D8F5C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:supermicro:x11sae-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9DED254-4F7C-4BA3-BDB4-C20046F1801D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:supermicro:x11sse-f_firmware:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "073133FA-E96D-44AD-A69B-D6BC8818D0E0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:supermicro:x11sse-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC57F4A1-10F8-4926-A446-D2B8F05B8008"
}
]
}
]
}
],
"references": [
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40285",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T04:15:09.440",
"lastModified": "2024-12-06T22:15:18.837",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:04:35.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,117 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:supermicro:x11ssm-f_firmware:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "20BC3CF1-B926-40C7-A22F-246B2DF85154"
}
]
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": false,
"criteria": "cpe:2.3:h:supermicro:x11ssm-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC19D26-080D-4B5A-A41C-253D00036608"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:supermicro:x11sae-f_firmware:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "4B6ECA00-0751-453C-AD3C-3092454D8F5C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:supermicro:x11sae-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9DED254-4F7C-4BA3-BDB4-C20046F1801D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:supermicro:x11sse-f_firmware:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "073133FA-E96D-44AD-A69B-D6BC8818D0E0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:supermicro:x11sse-f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC57F4A1-10F8-4926-A446-D2B8F05B8008"
}
]
}
]
}
],
"references": [
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41099",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T15:15:15.390",
"lastModified": "2024-11-21T08:20:34.550",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T14:18:19.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/cardos-api-local-privilege-escalation-psirt-358-tlp-clear-version-2-6-cve-2023-41099/view",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/cardos-api-local-privilege-escalation-psirt-358-tlp-clear-version-2-6-cve-2023-41099/view",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atos:eviden_cardos_api:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndExcluding": "5.5.5.2811",
"matchCriteriaId": "D0C8A139-ED77-4DCE-94C1-C4CECA873948"
}
]
}
]
}
],
"references": [
{
"url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/cardos-api-local-privilege-escalation-psirt-358-tlp-clear-version-2-6-cve-2023-41099/view",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/cardos-api-local-privilege-escalation-psirt-358-tlp-clear-version-2-6-cve-2023-41099/view",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44077",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-17T20:15:50.517",
"lastModified": "2024-11-21T08:25:11.473",
"lastModified": "2025-06-17T15:15:36.450",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-347"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46343",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T10:15:10.383",
"lastModified": "2024-11-21T08:28:19.323",
"lastModified": "2025-06-17T14:15:27.323",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46953",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-06T05:15:09.427",
"lastModified": "2024-11-21T08:29:32.780",
"lastModified": "2025-06-17T15:15:36.700",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4818",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-15T14:15:25.180",
"lastModified": "2024-11-21T08:36:02.230",
"lastModified": "2025-06-17T14:15:27.577",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 6.0
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5041",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-17T15:15:10.850",
"lastModified": "2024-11-21T08:40:57.330",
"lastModified": "2025-06-17T15:15:37.327",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51282",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T02:15:28.590",
"lastModified": "2024-11-21T08:37:56.710",
"lastModified": "2025-06-17T15:15:36.863",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51790",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T13:15:11.733",
"lastModified": "2024-11-21T08:38:48.780",
"lastModified": "2025-06-17T14:15:27.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51906",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-20T02:15:07.670",
"lastModified": "2024-11-21T08:38:55.823",
"lastModified": "2025-06-17T14:15:28.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52032",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-11T09:15:47.483",
"lastModified": "2024-11-21T08:39:03.040",
"lastModified": "2025-06-17T15:15:37.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52041",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-16T19:15:08.410",
"lastModified": "2024-11-21T08:39:03.710",
"lastModified": "2025-06-17T14:15:28.197",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6161",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-08T19:15:10.137",
"lastModified": "2024-11-21T08:43:16.843",
"lastModified": "2025-06-17T15:15:37.620",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6447",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-22T20:15:47.553",
"lastModified": "2024-11-21T08:43:52.870",
"lastModified": "2025-06-17T14:15:28.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7074",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-29T15:15:09.793",
"lastModified": "2024-11-21T08:45:11.670",
"lastModified": "2025-06-17T15:15:37.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1283",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-02-07T00:15:56.323",
"lastModified": "2024-11-21T08:50:13.640",
"lastModified": "2025-06-17T15:15:38.487",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20002",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.083",
"lastModified": "2024-11-21T08:51:46.143",
"lastModified": "2025-06-17T14:15:28.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22567",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-05T20:15:55.620",
"lastModified": "2024-11-21T08:56:27.563",
"lastModified": "2025-06-17T15:15:39.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22912",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-19T18:15:08.723",
"lastModified": "2024-11-21T08:56:47.240",
"lastModified": "2025-06-17T15:15:39.170",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23055",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-25T22:15:08.623",
"lastModified": "2024-11-21T08:56:52.597",
"lastModified": "2025-06-17T15:15:39.340",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23686",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-01-19T22:15:08.437",
"lastModified": "2024-11-21T08:58:10.460",
"lastModified": "2025-06-17T15:15:40.450",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24115",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T20:15:52.933",
"lastModified": "2024-11-21T08:58:56.140",
"lastModified": "2025-06-17T14:15:30.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28441",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T02:15:08.480",
"lastModified": "2024-11-21T09:06:22.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T14:26:25.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,40 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magicflue:magicflue:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.0",
"matchCriteriaId": "2A7EA268-BEB0-4861-A6E4-A5A1361D4B86"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28521",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T22:15:12.457",
"lastModified": "2024-11-21T09:06:26.813",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T14:45:13.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/aknbg1thub/cve/blob/main/sql.md",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netentsec:application_security_gateway_firmware:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65E29A4B-A93E-46D2-8F8E-7C2695C1D75B"
}
]
},
{
"url": "https://github.com/aknbg1thub/cve/blob/main/sql.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/aknbg1thub/cve/blob/main/sql.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/aknbg1thub/cve/blob/main/sql.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28635",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T04:15:09.373",
"lastModified": "2025-06-17T13:52:08.900",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:05:15.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:devsoftbaltic:survey_creator:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:devsoftbaltic:survey-creator:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.9.132",
"matchCriteriaId": "B6EE4799-49CB-41F4-B29C-3D6475B99F74"
"matchCriteriaId": "14DF7161-CDB1-4903-88C4-25EC82443254"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29273",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T04:15:11.857",
"lastModified": "2024-11-21T09:07:54.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T14:22:54.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/zyx0814/dzzoffice/issues/244",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/zyx0814/dzzoffice/issues/244",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1_sc_utf8:*:*:*:*:*:*:*",
"matchCriteriaId": "08D8E4EE-DC18-4672-AD08-AB6750489C80"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zyx0814/dzzoffice/issues/244",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/zyx0814/dzzoffice/issues/244",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29366",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T17:15:08.887",
"lastModified": "2024-11-21T09:07:57.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T14:16:46.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,66 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dir-845l_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.01krb03",
"matchCriteriaId": "BC7DE1C8-D307-491E-8F24-4AD51E896CC3"
}
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dir-845l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD53005B-ECBD-4211-88B1-A33EC5D0DFD7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29385",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-22T17:15:08.943",
"lastModified": "2024-11-21T09:07:58.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T14:09:38.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,66 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/songah119/Report/blob/main/CI-1.md",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dir-845l_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.01krb03",
"matchCriteriaId": "BC7DE1C8-D307-491E-8F24-4AD51E896CC3"
}
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/songah119/Report/blob/main/CI-1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dir-845l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD53005B-ECBD-4211-88B1-A33EC5D0DFD7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/songah119/Report/blob/main/CI-1.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/songah119/Report/blob/main/CI-1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31673",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T18:15:09.310",
"lastModified": "2024-11-21T09:13:48.477",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:05:11.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/265",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/265",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kliqqi:kliqqi_cms:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA8A074-F9FF-4CE1-9E47-D9DB7D776D68"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/265",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/265",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33791",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T17:15:08.047",
"lastModified": "2024-11-21T09:17:30.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:13:31.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33791",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netis-systems:mex605_firmware:2.00.06:*:*:*:*:*:*:*",
"matchCriteriaId": "887CCD86-2732-4B92-9DBB-216AE04CA504"
}
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33791",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netis-systems:mex605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "004827EF-B40F-47EB-93F7-9104EEE04465"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33791",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33791",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33792",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T17:15:08.093",
"lastModified": "2024-11-21T09:17:30.357",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:10:57.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +61,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netis-systems:mex605_firmware:2.00.06:*:*:*:*:*:*:*",
"matchCriteriaId": "887CCD86-2732-4B92-9DBB-216AE04CA504"
}
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netis-systems:mex605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "004827EF-B40F-47EB-93F7-9104EEE04465"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33793",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T17:15:08.147",
"lastModified": "2024-11-21T09:17:30.567",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:09:57.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netis-systems:mex605_firmware:2.00.06:*:*:*:*:*:*:*",
"matchCriteriaId": "887CCD86-2732-4B92-9DBB-216AE04CA504"
}
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netis-systems:mex605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "004827EF-B40F-47EB-93F7-9104EEE04465"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34402",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T01:15:48.633",
"lastModified": "2024-11-21T09:18:35.737",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:24:01.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,62 +51,161 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/1",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/3",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/uriparser/uriparser/issues/183",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/uriparser/uriparser/pull/185",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/uriparser/uriparser/issues/183",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/uriparser/uriparser/pull/185",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:uriparser_project:uriparser:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.9.7",
"matchCriteriaId": "28A780B0-75ED-46D5-B656-928BF2F6C45F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/1",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/3",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/uriparser/uriparser/issues/183",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/uriparser/uriparser/pull/185",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/uriparser/uriparser/issues/183",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/uriparser/uriparser/pull/185",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34403",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T01:15:48.693",
"lastModified": "2024-11-21T09:18:35.980",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:20:17.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,62 +51,163 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/1",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/3",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/uriparser/uriparser/issues/183",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/uriparser/uriparser/pull/186",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/uriparser/uriparser/issues/183",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/uriparser/uriparser/pull/186",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:uriparser_project:uriparser:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.9.7",
"matchCriteriaId": "28A780B0-75ED-46D5-B656-928BF2F6C45F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/1",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/3",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/uriparser/uriparser/issues/183",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/uriparser/uriparser/pull/186",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/06/3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/uriparser/uriparser/issues/183",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/uriparser/uriparser/pull/186",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory",
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R36L762D3KX3GA66OOPWW7M7KKDRXDP/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ6KEUQXWCTYXGTBMZDD7CHJCYI52XY3/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UG4J7PD475LSCGCSHFU4GMU4TWLDSNW2/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34467",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-04T20:15:07.527",
"lastModified": "2024-11-21T09:18:44.753",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:02:34.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/top-think/framework/issues/2996",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/top-think/framework/issues/2996",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thinkphp:thinkphp:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "468CD6C1-413F-4E30-9BE5-6470846F6B47"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/top-think/framework/issues/2996",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/top-think/framework/issues/2996",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34468",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-04T20:15:07.590",
"lastModified": "2024-12-04T21:15:23.670",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:01:01.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,42 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rukovoditel:rukovoditel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.3",
"matchCriteriaId": "AC4F2E82-7E5F-42D3-9BA2-259AF2585C32"
}
]
}
]
}
],
"references": [
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34469",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-04T20:15:07.640",
"lastModified": "2024-11-21T09:18:45.113",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:57:03.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,42 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rukovoditel:rukovoditel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.3",
"matchCriteriaId": "AC4F2E82-7E5F-42D3-9BA2-259AF2585C32"
}
]
}
]
}
],
"references": [
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34502",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T19:15:07.197",
"lastModified": "2024-11-21T09:18:49.567",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:53:28.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,101 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.39.6",
"matchCriteriaId": "6A7D7611-D088-4AF6-8CE0-EACBE4FF4492"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.40.0",
"versionEndExcluding": "1.40.2",
"matchCriteriaId": "3EF19DE5-1D79-4001-ABA1-D648AD6610D6"
},
{
"url": "https://phabricator.wikimedia.org/T357101",
"source": "cve@mitre.org"
},
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://phabricator.wikimedia.org/T357101",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.41.0",
"versionEndExcluding": "1.41.1",
"matchCriteriaId": "314B0F2D-27BD-486B-B528-FD8A7AAE53E6"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Mailing List"
]
},
{
"url": "https://phabricator.wikimedia.org/T357101",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/WikibaseLexeme/+/1013359",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Mailing List"
]
},
{
"url": "https://phabricator.wikimedia.org/T357101",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40120",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-16T13:15:51.237",
"lastModified": "2025-05-16T16:15:28.017",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:09:04.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/sud0why/1b2115c1d644bd3db1c1b3f16684a78c",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/seaweedfs/seaweedfs/issues/5710",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seaweedfs:seaweedfs:3.68:*:*:*:*:*:*:*",
"matchCriteriaId": "6DEC3675-AAAF-4E2D-AB11-3039C50F9692"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/sud0why/1b2115c1d644bd3db1c1b3f16684a78c",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/seaweedfs/seaweedfs/issues/5710",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44068",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T19:15:09.907",
"lastModified": "2024-10-10T12:57:21.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:52:59.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,184 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_9820_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E582F31-BCC1-4276-BC34-A38EDCC4BB01"
}
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-44068/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8C35DE-1C58-4C6E-BB15-0E3C2FECB8DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_9825_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7584E423-2C8E-4576-AB84-BC3A8351B3F9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_9825:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A6027E-CD79-4DBD-B065-BE5AE7967F3B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_990_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF6C91D-DECE-4630-85FE-C22EF2B9160A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87FE8214-E165-4874-BB5A-3C4298708039"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1928760C-4FC4-45B0-84FF-C1105CD1DD2A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB410A6D-642B-49AE-8B1C-EADA953A84DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6ADED27-EDAF-4FB3-8CB2-AE5F59B93641"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF79654-E5C6-4DFF-B33A-A78571CD300C"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-44068/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45184",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:06.947",
"lastModified": "2024-11-06T17:35:34.223",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:42:26.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,508 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_9820_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E582F31-BCC1-4276-BC34-A38EDCC4BB01"
}
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-45184/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8C35DE-1C58-4C6E-BB15-0E3C2FECB8DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_9825_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7584E423-2C8E-4576-AB84-BC3A8351B3F9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_9825:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A6027E-CD79-4DBD-B065-BE5AE7967F3B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_990_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF6C91D-DECE-4630-85FE-C22EF2B9160A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87FE8214-E165-4874-BB5A-3C4298708039"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1928760C-4FC4-45B0-84FF-C1105CD1DD2A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB410A6D-642B-49AE-8B1C-EADA953A84DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89B88BFE-3C82-498C-8EC1-5784836DB1A1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9385885D-654A-496E-8029-7C6D9B077193"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2635646-DD6A-4735-8E01-F45445584832"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0F8A58-71B7-4503-A03A-6FB4282D75BD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64897B0D-EBF6-4BEB-BF54-ABCDBFAB45E0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3F328B4-0442-4748-B5EE-DD1CEE50D6CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_9110_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1896BFF-D709-481B-AD4F-37D1A8B30C06"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_9110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6748EF2-3C63-41CD-B3D1-4B3FEC614B40"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6ADED27-EDAF-4FB3-8CB2-AE5F59B93641"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF79654-E5C6-4DFF-B33A-A78571CD300C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_w930_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "801E188F-C71B-4933-9099-151A4A1B1BC5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8FC82D-57C5-4F00-BDF4-4261A32C4246"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_modem_5123_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06B60F97-1320-44F5-970C-BBA29F375524"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_modem_5123:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72419735-076A-4E72-869F-0C7D801371C1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F66A096-7BA3-47D6-98F4-879C3A4C1FFC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE202894-D48A-4B9E-B3BD-28529967A0B3"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-45184/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46292",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T16:15:04.373",
"lastModified": "2024-10-21T00:15:12.240",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-17T15:49:56.567",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
@ -58,18 +58,44 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/owasp-modsecurity/ModSecurity/blob/v3/master/README.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/yoloflz101/yoloflz/blob/main/README.md",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://modsecurity.org/20241011/about-cve-2024-46292-2024-october/",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE9C31F-37F8-4AD6-A606-222793761F95"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/owasp-modsecurity/ModSecurity/blob/v3/master/README.md",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/yoloflz101/yoloflz/blob/main/README.md",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://modsecurity.org/20241011/about-cve-2024-46292-2024-october/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46540",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-30T17:15:04.550",
"lastModified": "2024-10-04T13:51:25.567",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:57:20.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,46 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/microvorld/1c1ef9c3390a5d88a5ede9f9424a8bd2",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/emlog/emlog",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/microvorld/CVE-2024/blob/main/emlog.md",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"versionEndExcluding": "2.3.15",
"matchCriteriaId": "EE25D2F6-8025-4EC4-8418-6B9D14F7F341"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/microvorld/1c1ef9c3390a5d88a5ede9f9424a8bd2",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/emlog/emlog",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/microvorld/CVE-2024/blob/main/emlog.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47913",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T22:15:02.687",
"lastModified": "2024-12-06T21:15:08.590",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:54:48.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,55 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/AbuseFilter/+/1076855",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.39.9",
"matchCriteriaId": "FD0C21BE-0A08-4CEB-9CB8-B79BD88103B7"
},
{
"url": "https://phabricator.wikimedia.org/T372998",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.40.0",
"versionEndExcluding": "1.41.3",
"matchCriteriaId": "B0ED8E65-CFE2-465C-A330-15FCE03B3056"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.42.0",
"versionEndExcluding": "1.42.2",
"matchCriteriaId": "0ECB922E-CEC2-40BF-8655-09D0E48E2D42"
}
]
}
]
}
],
"references": [
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/AbuseFilter/+/1076855",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://phabricator.wikimedia.org/T372998",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48112",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-30T21:15:14.393",
"lastModified": "2024-11-01T12:57:03.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:38:05.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,40 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/Thinkphp/CVE-2024-48112.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/top-think/think",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.3",
"versionEndIncluding": "8.0.4",
"matchCriteriaId": "4E49985F-0F72-4C76-AC59-BE406157A940"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/Thinkphp/CVE-2024-48112.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/top-think/think",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48700",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T18:15:04.407",
"lastModified": "2024-10-29T19:35:24.643",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T15:40:35.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ChangeYourWay/post/blob/main/CVE-2024-48700",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kliqqi:kliqqi_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.5.2",
"matchCriteriaId": "A4A4B686-93A3-4501-99EA-3E511EE56FDF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ChangeYourWay/post/blob/main/CVE-2024-48700",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-58134",
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"published": "2025-05-03T16:15:19.310",
"lastModified": "2025-05-12T19:15:48.523",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:15:38.223",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,30 +55,70 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/hashcat/hashcat/pull/4090",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
"nodes": [
{
"url": "https://github.com/mojolicious/mojo/pull/1791",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/mojolicious/mojo/pull/2200",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://medium.com/securing/baking-mojolicious-cookies-revisited-a-case-study-of-solving-security-problems-through-security-by-13da7c225802",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojolicious.pm#L51",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://www.synacktiv.com/publications/baking-mojolicious-cookies",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
"vulnerable": true,
"criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:perl:*:*",
"versionStartIncluding": "0.999922",
"versionEndIncluding": "9.40",
"matchCriteriaId": "007066BB-83B9-4F4C-BAAB-261837197373"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hashcat/hashcat/pull/4090",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/mojolicious/mojo/pull/1791",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/mojolicious/mojo/pull/2200",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://medium.com/securing/baking-mojolicious-cookies-revisited-a-case-study-of-solving-security-problems-through-security-by-13da7c225802",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojolicious.pm#L51",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Product"
]
},
{
"url": "https://www.synacktiv.com/publications/baking-mojolicious-cookies",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-58135",
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"published": "2025-05-03T11:15:48.037",
"lastModified": "2025-05-12T19:15:48.663",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:16:05.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,34 +61,77 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/hashcat/hashcat/pull/4090",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
"nodes": [
{
"url": "https://github.com/mojolicious/mojo/pull/2200",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://metacpan.org/release/SRI/Mojolicious-7.28/source/lib/Mojolicious/Command/generate/app.pm#L220",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://metacpan.org/release/SRI/Mojolicious-9.38/source/lib/Mojolicious/Command/Author/generate/app.pm#L202",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojo/Util.pm#L181",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://perldoc.perl.org/functions/rand",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
},
{
"url": "https://security.metacpan.org/docs/guides/random-data-for-security.html",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
"vulnerable": true,
"criteria": "cpe:2.3:a:mojolicious:mojolicious:*:*:*:*:*:perl:*:*",
"versionStartIncluding": "7.28",
"versionEndIncluding": "9.40",
"matchCriteriaId": "18CB7F71-95D5-44DC-BD63-01394CC408B4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hashcat/hashcat/pull/4090",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/mojolicious/mojo/pull/2200",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
},
{
"url": "https://metacpan.org/release/SRI/Mojolicious-7.28/source/lib/Mojolicious/Command/generate/app.pm#L220",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Product"
]
},
{
"url": "https://metacpan.org/release/SRI/Mojolicious-9.38/source/lib/Mojolicious/Command/Author/generate/app.pm#L202",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Product"
]
},
{
"url": "https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojo/Util.pm#L181",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Product"
]
},
{
"url": "https://perldoc.perl.org/functions/rand",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Product"
]
},
{
"url": "https://security.metacpan.org/docs/guides/random-data-for-security.html",
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"tags": [
"Technical Description"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0320",
"sourceIdentifier": "secure@citrix.com",
"published": "2025-06-17T14:15:30.270",
"lastModified": "2025-06-17T14:15:30.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Secure Access Client for Windows"
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "secure@citrix.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "secure@citrix.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694724",
"source": "secure@citrix.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21572",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-05-02T22:15:16.927",
"lastModified": "2025-05-06T15:16:01.123",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:16:23.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.oracle.com/security-alerts/all-oracle-cves-outside-other-oracle-public-documents.html",
"source": "secalert_us@oracle.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:opengrok:1.13.25:*:*:*:*:*:*:*",
"matchCriteriaId": "052D26CE-749F-4CE2-8B93-8813CFD630CE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/all-oracle-cves-outside-other-oracle-public-documents.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24761",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:40.800",
"lastModified": "2025-06-17T15:15:40.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme DSK allows PHP Local File Inclusion. This issue affects DSK: from n/a through 2.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/dsk/vulnerability/wordpress-dsk-2-2-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24773",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:40.940",
"lastModified": "2025-06-17T15:15:40.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPCRM - CRM for Contact form CF7 & WooCommerce allows SQL Injection. This issue affects WPCRM - CRM for Contact form CF7 & WooCommerce: from n/a through 3.2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wpcrm/vulnerability/wordpress-wpcrm-crm-for-contact-form-cf7-woocommerce-3-2-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25504",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-05T16:15:50.640",
"lastModified": "2025-05-05T20:54:19.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:13:16.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,14 +55,82 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://gefen.com",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:niceforyou:gefen_webfwc:1.70v:*:*:*:*:*:*:*",
"matchCriteriaId": "AD283856-18D2-4625-8A88-D3F9DFA31610"
}
]
},
{
"url": "https://www.troy-wilson.com/cve-2025-25504.html",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:niceforyou:gefen_gf-avip-mc_firmware:a5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E81DB305-DDB0-48A6-A171-F1F3ED3EA816"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:niceforyou:gefen_webfwc:1.85h:*:*:*:*:*:*:*",
"matchCriteriaId": "D58769C1-827B-4963-A00D-2C1B389EE396"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:niceforyou:gefen_webfwc:1.86v:*:*:*:*:*:*:*",
"matchCriteriaId": "EE973A49-081A-4CA1-BFCA-F71E1FC36FD4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:niceforyou:gefen_gf-avip-mc_firmware:a5.310:*:*:*:*:*:*:*",
"matchCriteriaId": "C404DBC9-0EE7-4BD1-90DC-B09D4FBA5775"
}
]
}
]
}
],
"references": [
{
"url": "http://gefen.com",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.troy-wilson.com/cve-2025-25504.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28062",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-05T16:15:51.310",
"lastModified": "2025-05-13T20:15:27.343",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:13:04.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,42 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/Thvt0ne/CVE-2025-28062",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:frappe:erpnext:14.74.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5CF42DBE-9321-4CC3-9093-3CAB462BCDFF"
},
{
"url": "https://github.com/frappe/erpnext",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:frappe:erpnext:14.82.1:*:*:*:*:*:*:*",
"matchCriteriaId": "951326DA-FE7B-4DED-AAC5-F889C79BD830"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Thvt0ne/CVE-2025-28062",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/frappe/erpnext",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28168",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-05T14:15:28.500",
"lastModified": "2025-05-08T18:15:42.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:15:20.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -81,14 +81,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/IamLeandrooooo/01090be3023f5e7c7397bb9b1f5505b9",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.outsystems.com/forge/component-overview/200/multiple-file-upload-o11",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:multiple_file_upload_project:multiple_file_upload:3.1.0:*:*:*:*:outsystems:*:*",
"matchCriteriaId": "7FC6134C-BD60-43D3-A3C7-C2FB4740B03D"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/IamLeandrooooo/01090be3023f5e7c7397bb9b1f5505b9",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.outsystems.com/forge/component-overview/200/multiple-file-upload-o11",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-28972",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:41.077",
"lastModified": "2025-06-17T15:15:41.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Suhas Surse WP Employee Attendance System allows Blind SQL Injection. This issue affects WP Employee Attendance System: from n/a through 3.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-employee-attendance-system/vulnerability/wordpress-wp-employee-attendance-system-3-5-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-28991",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:41.210",
"lastModified": "2025-06-17T15:15:41.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Evon allows PHP Local File Inclusion. This issue affects Evon: from n/a through 3.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/snsevon/vulnerability/wordpress-evon-3-4-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-29002",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:41.360",
"lastModified": "2025-06-17T15:15:41.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Simen allows PHP Local File Inclusion. This issue affects Simen: from n/a through 4.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/snssimen/vulnerability/wordpress-simen-4-6-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30562",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:41.507",
"lastModified": "2025-06-17T15:15:41.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdistillery Navigation Tree Elementor allows Blind SQL Injection. This issue affects Navigation Tree Elementor: from n/a through 1.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/navigation-tree-elementor/vulnerability/wordpress-navigation-tree-elementor-1-0-1-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30618",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:41.650",
"lastModified": "2025-06-17T15:15:41.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in yuliaz Rapyd Payment Extension for WooCommerce allows Object Injection. This issue affects Rapyd Payment Extension for WooCommerce: from n/a through 1.2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/rapyd-payments/vulnerability/wordpress-rapyd-payment-extension-for-woocommerce-1-1-9-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30988",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:41.793",
"lastModified": "2025-06-17T15:15:41.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in _CreativeMedia_ Elite Video Player allows Stored XSS. This issue affects Elite Video Player: from n/a through 10.0.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/elite-video-player/vulnerability/wordpress-elite-video-player-10-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-31919",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:41.943",
"lastModified": "2025-06-17T15:15:41.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in themeton Spare allows Object Injection. This issue affects Spare: from n/a through 1.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/spare/vulnerability/wordpress-spare-1-7-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-32510",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:42.093",
"lastModified": "2025-06-17T15:15:42.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in ovatheme Ovatheme Events Manager allows Using Malicious Files. This issue affects Ovatheme Events Manager: from n/a through 1.7.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ova-events-manager/vulnerability/wordpress-ovatheme-events-manager-plugin-1-7-5-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-32549",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:42.247",
"lastModified": "2025-06-17T15:15:42.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla WPGYM allows PHP Local File Inclusion. This issue affects WPGYM: from n/a through 65.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/gym-management/vulnerability/wordpress-wpgym-65-0-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2025-34508",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-17T15:15:42.407",
"lastModified": "2025-06-17T15:15:42.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in the file dropoff functionality \nof ZendTo versions 6.15-7 and prior. This could allow a remote, authenticated attacker to retrieve the files of other ZendTo users, retrieve files on the host \nsystem, or cause a denial of service."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://horizon3.ai/attack-research/attack-blogs/cve-2025-34508-another-file-sharing-application-another-path-traversal/",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3517",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-05-01T19:15:58.517",
"lastModified": "2025-05-02T13:52:51.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:18:39.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0006/",
"source": "security@devolutions.net"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2025.1.6.0",
"matchCriteriaId": "3DDC73A7-6F06-4BB1-9C50-2EFE929D55CD"
}
]
}
]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0006/",
"source": "security@devolutions.net",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-39479",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:42.567",
"lastModified": "2025-06-17T15:15:42.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in smartiolabs Smart Notification allows Blind SQL Injection. This issue affects Smart Notification: from n/a through 10.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/smio-push-notification/vulnerability/wordpress-smart-notification-plugin-10-3-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-39486",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:42.727",
"lastModified": "2025-06-17T15:15:42.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Rankie allows SQL Injection. This issue affects Rankie: from n/a through n/a."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/valvepress-rankie/vulnerability/wordpress-rankie-plugin-1-8-2-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-39508",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:42.873",
"lastModified": "2025-06-17T15:15:42.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NasaTheme Nasa Core allows Reflected XSS. This issue affects Nasa Core: from n/a through 6.3.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/nasa-core/vulnerability/wordpress-nasa-core-plugin-6-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3927",
"sourceIdentifier": "cret@cert.org",
"published": "2025-05-02T15:15:49.017",
"lastModified": "2025-05-12T16:15:24.823",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:18:20.087",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cret@cert.org",
@ -46,14 +46,49 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.digigram.com/download/pyko-out-user-manual-en-jan-2019/",
"source": "cret@cert.org"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.kb.cert.org/vuls/id/360686",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digigram:pyko-out:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DE1AE15-833F-4E8C-9A8D-621552D371B7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.digigram.com/download/pyko-out-user-manual-en-jan-2019/",
"source": "cret@cert.org",
"tags": [
"Product"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/360686",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4178",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-01T22:15:18.140",
"lastModified": "2025-05-02T18:15:27.780",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:18:28.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV2": [
@ -120,26 +140,75 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md",
"source": "cna@vuldb.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xiaowei1118:java_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2019-09-22",
"matchCriteriaId": "A68DDC2A-D82D-4D37-87E3-7DEFAEEFF8A5"
}
]
},
{
"url": "https://vuldb.com/?ctiid.306797",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.306797",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.561794",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.306797",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.306797",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.561794",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4215",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-02T21:15:23.893",
"lastModified": "2025-06-12T01:15:26.443",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:17:53.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -122,36 +142,185 @@
"value": "CWE-1333"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.63.3",
"matchCriteriaId": "E79DA830-EA8C-47B6-BD7F-0842DEC5F88C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta1:*:*:*:*:*:*",
"matchCriteriaId": "79A4228B-1FA0-4150-8D6F-814F1DB61AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta10:*:*:*:*:*:*",
"matchCriteriaId": "0DACB05D-3A30-4ADE-A265-7EA081710055"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta11:*:*:*:*:*:*",
"matchCriteriaId": "A06C4A41-F9F3-4FD8-88FE-D245B462E881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta12:*:*:*:*:*:*",
"matchCriteriaId": "05C5AE9C-2C38-44C8-BA47-A274E45CCE20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta13:*:*:*:*:*:*",
"matchCriteriaId": "C5BB4A6D-F31D-48D2-853C-0631DD9FA574"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta14:*:*:*:*:*:*",
"matchCriteriaId": "FEBC2AC0-72E3-4879-8360-D10C766FA618"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta15:*:*:*:*:*:*",
"matchCriteriaId": "7437C121-9E8F-4A04-ACEF-25CD49AB1EE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta16:*:*:*:*:*:*",
"matchCriteriaId": "7F39A0E7-A745-49CB-93A0-06E3E6B622DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta2:*:*:*:*:*:*",
"matchCriteriaId": "07374522-6C44-4037-A81C-AED82D4AB365"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta3:*:*:*:*:*:*",
"matchCriteriaId": "85EB1169-3841-4D09-A747-17CE738A91B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta4:*:*:*:*:*:*",
"matchCriteriaId": "887E88B7-3905-487F-9462-D32F234D0FC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta5:*:*:*:*:*:*",
"matchCriteriaId": "6FB0CF01-BD25-441D-B3D3-B4C948211B12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta6:*:*:*:*:*:*",
"matchCriteriaId": "1BCA6D91-F17D-4E7C-B986-58C4E1313522"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta7:*:*:*:*:*:*",
"matchCriteriaId": "0178FB98-7B4D-45F4-9880-8B471AA5702A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta8:*:*:*:*:*:*",
"matchCriteriaId": "9EC0A01E-DB43-487A-BDA9-5EAB05670DBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ublockorigin:ublock_origin:1.63.3:beta9:*:*:*:*:*:*",
"matchCriteriaId": "43563BB4-DE44-4780-A963-B73161987B1B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gorhill/uBlock/commit/eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://github.com/gorhill/uBlock/releases/tag/1.63.3b17",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.307194",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.307194",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.562301",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00013.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://github.com/gorhill/uBlock/commit/eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4218",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-02T21:15:24.057",
"lastModified": "2025-05-05T20:54:19.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:16:53.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:andrewhhan:browserpilot:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.2.51",
"matchCriteriaId": "6FB7E480-79E2-4AA5-A75E-3E322D2F0B1A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/handrew/browserpilot/issues/20",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/handrew/browserpilot/issues/20#issue-2999815850",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.307195",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.307195",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.562383",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/handrew/browserpilot/issues/20",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,56 +2,220 @@
"id": "CVE-2025-43200",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-06-16T22:16:41.120",
"lastModified": "2025-06-17T01:00:02.367",
"vulnStatus": "Received",
"lastModified": "2025-06-17T15:52:31.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando las comprobaciones. Este problema se solucion\u00f3 en watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 y iPadOS 15.8.4, iOS 16.7.11 y iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 y iPadOS 18.3.1, y macOS Sonoma 14.7.4. Exist\u00eda un problema l\u00f3gico al procesar una foto o un v\u00eddeo creado con fines maliciosos compartidos a trav\u00e9s de un enlace de iCloud. Apple tiene conocimiento de un informe que indica que este problema podr\u00eda haber sido explotado en un ataque extremadamente sofisticado contra personas espec\u00edficas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
},
"cisaExploitAdd": "2025-06-16",
"cisaActionDue": "2025-07-07",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Apple Multiple Products Unspecified Vulnerability",
"references": [
"weaknesses": [
{
"url": "https://support.apple.com/en-us/122173",
"source": "product-security@apple.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://support.apple.com/en-us/122174",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122345",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122346",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122900",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122901",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122902",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122903",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122904",
"source": "product-security@apple.com"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.8.4",
"matchCriteriaId": "307F4698-5786-4CA5-98A8-E3AAF1E7A09D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndExcluding": "16.7.11",
"matchCriteriaId": "9323964E-AE9A-46DB-8E97-C74E77C914E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.7.5",
"matchCriteriaId": "FE5060E3-0884-40C3-B9EE-B0A72B7E400F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.0",
"versionEndExcluding": "18.3.1",
"matchCriteriaId": "A77F4D69-3C11-4074-A7E6-C85767F026EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.8.4",
"matchCriteriaId": "F8A92F23-F3AF-4365-B405-70AFC1D9ECB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndIncluding": "16.7.11",
"matchCriteriaId": "53A97BDC-343C-4767-BE85-21CB53EEC517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndIncluding": "18.3.1",
"matchCriteriaId": "36145355-2878-4236-B2B7-ED32AEFD3862"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.4",
"matchCriteriaId": "2B4C5FF9-09CB-426B-AFE2-519E7AB7EA4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.4",
"matchCriteriaId": "D1B00E67-4EE3-49F8-9087-8C2FC95C9C6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.3.1",
"matchCriteriaId": "5A4E86B3-4331-4C55-9B1F-A15A5FC88BA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.1",
"matchCriteriaId": "57566A2E-9B11-405D-8C46-F8FE45DA464B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.3.1",
"matchCriteriaId": "F898D7BC-247F-434F-9F95-7771723C4F5C"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122173",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122174",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122345",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122346",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122900",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122901",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122902",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122903",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122904",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Press/Media Coverage"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-43915",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-05T17:18:49.603",
"lastModified": "2025-05-19T16:15:30.010",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:12:57.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,73 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://docs.buoyant.io/security/advisories/2025-01/",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*",
"versionStartIncluding": "2.13.0",
"versionEndIncluding": "2.13.7",
"matchCriteriaId": "C9742371-D40C-41C4-B2BF-549DFD744D25"
},
{
"url": "https://www.buoyant.io/resources",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*",
"versionStartIncluding": "2.14.0",
"versionEndIncluding": "2.14.10",
"matchCriteriaId": "50AC0938-14D0-4C9F-91A2-AE672D698440"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*",
"versionStartIncluding": "2.15.0",
"versionEndIncluding": "2.15.7",
"matchCriteriaId": "DFA5823A-8764-4DA2-B581-98C81EB8595C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*",
"versionStartIncluding": "2.16.0",
"versionEndExcluding": "2.16.5",
"matchCriteriaId": "4958DFE3-9F0F-4B67-9BBC-F94D3A006DFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linkerd:buoyant:*:*:*:*:enterprise:linkerd:*:*",
"versionStartIncluding": "2.17.0",
"versionEndExcluding": "2.17.2",
"matchCriteriaId": "23536DA5-20CE-4B36-BB34-5487C7CFF3E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linkerd:linkerd:*:*:*:*:edge:kubernetes:*:*",
"versionEndExcluding": "25.2.1",
"matchCriteriaId": "345C63E1-3AC0-4698-9066-DCD4B3DCD8E4"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.buoyant.io/security/advisories/2025-01/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.buoyant.io/resources",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4316",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-05-05T14:15:29.930",
"lastModified": "2025-05-14T13:15:48.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:13:42.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0007/",
"source": "security@devolutions.net"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.17.0",
"matchCriteriaId": "30844EBB-E284-4CCF-B7A3-48B74A9BF5DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2025.1.3.0",
"versionEndExcluding": "2025.1.7.0",
"matchCriteriaId": "29B618AF-ED49-494B-BCDB-1135D3221F1A"
}
]
}
]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2025-0007/",
"source": "security@devolutions.net",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2025-4404",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-06-17T14:15:32.743",
"lastModified": "2025-06-17T15:15:53.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1220"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:9184",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9185",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9186",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9187",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9188",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9189",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9190",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9191",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9192",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9193",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:9194",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-4404",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2364606",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-45242",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-05T17:18:50.540",
"lastModified": "2025-05-05T20:54:19.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:12:39.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,44 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://rhymix.com",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://gist.github.com/chao112122/536a55fece5f578b90cee2c841eecdce",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/rhymix/rhymix",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:rhymix:rhymix:2.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "082A9480-66FD-4EB1-B11F-491F5BDF0194"
}
]
}
]
}
],
"references": [
{
"url": "http://rhymix.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://gist.github.com/chao112122/536a55fece5f578b90cee2c841eecdce",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/rhymix/rhymix",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-46567",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-01T18:15:58.117",
"lastModified": "2025-05-02T18:15:27.260",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:19:39.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,18 +71,47 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv",
"source": "security-advisories@github.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"vulnerable": true,
"criteria": "cpe:2.3:a:hiyouga:llama-factory:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0",
"matchCriteriaId": "CCE62620-4488-49A9-BA7B-C8E2790768AC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hiyouga/LLaMA-Factory/commit/2989d39239d2f46e584c1e1180ba46b9768afb2a",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/hiyouga/LLaMA-Factory/security/advisories/GHSA-f2f7-gj54-6vpv",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-46568",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-01T18:15:58.263",
"lastModified": "2025-05-02T14:15:19.860",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:19:19.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
@ -73,14 +95,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stirlingpdf:stirling_pdf:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.45.0",
"matchCriteriaId": "4BA2DA40-27DC-43EF-8B84-E803B5320D23"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r",
"source": "security-advisories@github.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-998c-x8hx-737r",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-46724",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-20T18:15:46.430",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-17T14:11:48.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,47 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/langroid/langroid/commit/0d9e4a7bb3ae2eef8d38f2e970ff916599a2b2a6",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj",
"source": "security-advisories@github.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"vulnerable": true,
"criteria": "cpe:2.3:a:langroid:langroid:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.53.15",
"matchCriteriaId": "FBE9F987-C1AA-4EB5-A30A-935D89DB9EA7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/langroid/langroid/commit/0d9e4a7bb3ae2eef8d38f2e970ff916599a2b2a6",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://github.com/langroid/langroid/security/advisories/GHSA-jqq5-wc57-f8hj",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47452",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:43.227",
"lastModified": "2025-06-17T15:15:43.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in RexTheme WP VR allows Upload a Web Shell to a Web Server. This issue affects WP VR: from n/a through 8.5.26."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wpvr/vulnerability/wordpress-wp-vr-8-5-26-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47559",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:43.397",
"lastModified": "2025-06-17T15:15:43.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in RomanCode MapSVG allows Upload a Web Shell to a Web Server. This issue affects MapSVG: from n/a through 8.5.32."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/mapsvg/vulnerability/wordpress-mapsvg-plugin-8-5-32-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47572",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:43.573",
"lastModified": "2025-06-17T15:15:43.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla School Management allows PHP Local File Inclusion. This issue affects School Management: from n/a through 93.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/school-management/vulnerability/wordpress-school-management-93-0-0-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47573",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:43.947",
"lastModified": "2025-06-17T15:15:43.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla School Management allows Blind SQL Injection. This issue affects School Management: from n/a through 92.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/school-management/vulnerability/wordpress-school-management-system-plugin-92-0-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-4754",
"sourceIdentifier": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"published": "2025-06-17T15:15:53.273",
"lastModified": "2025-06-17T15:15:53.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient Session Expiration vulnerability in ash-project ash_authentication_phoenix allows Session Hijacking. This vulnerability is associated with program files lib/ash_authentication_phoenix/controller.ex.\n\nThis issue affects ash_authentication_phoenix until 2.10.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://github.com/team-alembic/ash_authentication_phoenix/pull/634",
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db"
},
{
"url": "https://github.com/team-alembic/ash_authentication_phoenix/security/advisories/GHSA-f7gq-h8jv-h3cq",
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-48111",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:44.133",
"lastModified": "2025-06-17T15:15:44.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in YITHEMES YITH PayPal Express Checkout for WooCommerce allows Cross Site Request Forgery. This issue affects YITH PayPal Express Checkout for WooCommerce: from n/a through 1.49.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/yith-paypal-express-checkout-for-woocommerce/vulnerability/wordpress-yith-paypal-express-checkout-for-woocommerce-plugin-1-49-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-48118",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:44.350",
"lastModified": "2025-06-17T15:15:44.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpExperts Hub Woocommerce Partial Shipment allows SQL Injection. This issue affects Woocommerce Partial Shipment: from n/a through 3.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wc-partial-shipment/vulnerability/wordpress-woocommerce-partial-shipment-3-2-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-48145",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-06-17T15:15:44.513",
"lastModified": "2025-06-17T15:15:44.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michal Jaworski Track, Analyze & Optimize by WP Tao allows Reflected XSS. This issue affects Track, Analyze & Optimize by WP Tao: from n/a through 1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-tao/vulnerability/wordpress-track-analyze-optimize-by-wp-tao-plugin-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

Some files were not shown because too many files have changed in this diff Show More