Auto-Update: 2025-06-04T12:00:22.911436+00:00

This commit is contained in:
cad-safe-bot 2025-06-04 12:03:59 +00:00
parent 0ddbc5a2a2
commit 637ab4cb75
8 changed files with 448 additions and 81 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2018-25112",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-04T10:15:20.380",
"lastModified": "2025-06-04T10:15:20.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2018-012/",
"source": "info@cert.vde.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6538",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-25T07:15:06.187",
"lastModified": "2025-05-21T00:15:21.840",
"lastModified": "2025-06-04T10:15:21.357",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -56,6 +56,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:7863",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:8280",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6538",
"source": "secalert@redhat.com"

View File

@ -2,52 +2,15 @@
"id": "CVE-2025-37782",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-05-01T14:15:42.163",
"lastModified": "2025-05-02T13:53:20.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-04T11:15:21.673",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key\n\nSyzbot reported an issue in hfs subsystem:\n\nBUG: KASAN: slab-out-of-bounds in memcpy_from_page include/linux/highmem.h:423 [inline]\nBUG: KASAN: slab-out-of-bounds in hfs_bnode_read fs/hfs/bnode.c:35 [inline]\nBUG: KASAN: slab-out-of-bounds in hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70\nWrite of size 94 at addr ffff8880123cd100 by task syz-executor237/5102\n\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106\n memcpy_from_page include/linux/highmem.h:423 [inline]\n hfs_bnode_read fs/hfs/bnode.c:35 [inline]\n hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70\n hfs_brec_insert+0x7f3/0xbd0 fs/hfs/brec.c:159\n hfs_cat_create+0x41d/0xa50 fs/hfs/catalog.c:118\n hfs_mkdir+0x6c/0xe0 fs/hfs/dir.c:232\n vfs_mkdir+0x2f9/0x4f0 fs/namei.c:4257\n do_mkdirat+0x264/0x3a0 fs/namei.c:4280\n __do_sys_mkdir fs/namei.c:4300 [inline]\n __se_sys_mkdir fs/namei.c:4298 [inline]\n __x64_sys_mkdir+0x6c/0x80 fs/namei.c:4298\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fbdd6057a99\n\nAdd a check for key length in hfs_bnode_read_key to prevent\nout-of-bounds memory access. If the key length is invalid, the\nkey buffer is cleared, improving stability and reliability."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hfs/hfsplus: se corrige slab-out-of-bounds en hfs_bnode_read_key Syzbot inform\u00f3 de un problema en el subsistema hfs: ERROR: KASAN: slab-out-of-bounds en memcpy_from_page include/linux/highmem.h:423 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en hfs_bnode_read fs/hfs/bnode.c:35 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70 Escritura de tama\u00f1o 94 en la direcci\u00f3n ffff8880123cd100 por la tarea syz-executor237/5102 Rastreo de llamadas: __dump_stack lib/dump_stack.c:94 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:377 [en l\u00ednea] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106 memcpy_from_page include/linux/highmem.h:423 [en l\u00ednea] hfs_bnode_read fs/hfs/bnode.c:35 [en l\u00ednea] hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70 hfs_brec_insert+0x7f3/0xbd0 fs/hfs/brec.c:159 hfs_cat_create+0x41d/0xa50 fs/hfs/catalog.c:118 hfs_mkdir+0x6c/0xe0 fs/hfs/dir.c:232 vfs_mkdir+0x2f9/0x4f0 fs/namei.c:4257 do_mkdirat+0x264/0x3a0 fs/namei.c:4280 __do_sys_mkdir fs/namei.c:4300 [en l\u00ednea] __se_sys_mkdir fs/namei.c:4298 [en l\u00ednea] __x64_sys_mkdir+0x6c/0x80 fs/namei.c:4298 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fbdd6057a99 Se ha a\u00f1adido una comprobaci\u00f3n de la longitud de la clave en hfs_bnode_read_key para evitar el acceso a memoria fuera de los l\u00edmites. Si la longitud de la clave no es v\u00e1lida, se borra el b\u00fafer de claves, lo que mejora la estabilidad y la fiabilidad."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0296f9733543c7c8e666e69da743cfffd32dd805",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8060afd77761eac2048db12fb0510d76ce0cf1f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/84e8719c087e68c967975b78e67be54f697c957f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9c93fb4ad8d3b730afe1a09949ebbea64d4f60eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9f77aa584a659b21211a794e53522e6fb16d4a16",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a33c035df01d1e008874607da74bf7cf45152f47",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bb5e07cb927724e0b47be371fa081141cfb14414",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f6651c04191d49907d40f0891bbe51ef9703c792",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5583",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-04T10:15:21.640",
"lastModified": "2025-06-04T10:15:21.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /register.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_register.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311040",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311040",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.588822",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5584",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-04T10:15:21.870",
"lastModified": "2025-06-04T10:15:21.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been classified as problematic. Affected is an unknown function of the file /doctor/edit-patient.php?editid=2 of the component POST Parameter Handler. The manipulation of the argument patname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"baseScore": 3.3,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Ant1sec-ops/Hospital-management-Systemv4.0-Stored-XSS/blob/main/stored-xss-exploit.md",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311046",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311046",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.588828",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-5601",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-06-04T11:15:22.110",
"lastModified": "2025-06-04T11:15:22.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/wireshark/wireshark/-/issues/20509",
"source": "cve@gitlab.com"
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html",
"source": "cve@gitlab.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-04T10:00:20.957487+00:00
2025-06-04T12:00:22.911436+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-04T09:15:21.227000+00:00
2025-06-04T11:15:22.110000+00:00
```
### Last Data Feed Release
@ -33,35 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
296445
296449
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `4`
- [CVE-2024-13967](CVE-2024/CVE-2024-139xx/CVE-2024-13967.json) (`2025-06-04T08:15:21.367`)
- [CVE-2025-27444](CVE-2025/CVE-2025-274xx/CVE-2025-27444.json) (`2025-06-04T08:15:21.613`)
- [CVE-2025-47724](CVE-2025/CVE-2025-477xx/CVE-2025-47724.json) (`2025-06-04T08:15:21.867`)
- [CVE-2025-47725](CVE-2025/CVE-2025-477xx/CVE-2025-47725.json) (`2025-06-04T08:15:22.057`)
- [CVE-2025-47726](CVE-2025/CVE-2025-477xx/CVE-2025-47726.json) (`2025-06-04T08:15:22.190`)
- [CVE-2025-47727](CVE-2025/CVE-2025-477xx/CVE-2025-47727.json) (`2025-06-04T08:15:22.320`)
- [CVE-2025-47728](CVE-2025/CVE-2025-477xx/CVE-2025-47728.json) (`2025-06-04T08:15:22.453`)
- [CVE-2025-5482](CVE-2025/CVE-2025-54xx/CVE-2025-5482.json) (`2025-06-04T08:15:22.613`)
- [CVE-2025-5576](CVE-2025/CVE-2025-55xx/CVE-2025-5576.json) (`2025-06-04T08:15:22.810`)
- [CVE-2025-5577](CVE-2025/CVE-2025-55xx/CVE-2025-5577.json) (`2025-06-04T08:15:22.997`)
- [CVE-2025-5578](CVE-2025/CVE-2025-55xx/CVE-2025-5578.json) (`2025-06-04T08:15:23.177`)
- [CVE-2025-5579](CVE-2025/CVE-2025-55xx/CVE-2025-5579.json) (`2025-06-04T08:15:23.360`)
- [CVE-2025-5580](CVE-2025/CVE-2025-55xx/CVE-2025-5580.json) (`2025-06-04T09:15:20.800`)
- [CVE-2025-5581](CVE-2025/CVE-2025-55xx/CVE-2025-5581.json) (`2025-06-04T09:15:21.010`)
- [CVE-2025-5582](CVE-2025/CVE-2025-55xx/CVE-2025-5582.json) (`2025-06-04T09:15:21.227`)
- [CVE-2018-25112](CVE-2018/CVE-2018-251xx/CVE-2018-25112.json) (`2025-06-04T10:15:20.380`)
- [CVE-2025-5583](CVE-2025/CVE-2025-55xx/CVE-2025-5583.json) (`2025-06-04T10:15:21.640`)
- [CVE-2025-5584](CVE-2025/CVE-2025-55xx/CVE-2025-5584.json) (`2025-06-04T10:15:21.870`)
- [CVE-2025-5601](CVE-2025/CVE-2025-56xx/CVE-2025-5601.json) (`2025-06-04T11:15:22.110`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `2`
- [CVE-2025-37832](CVE-2025/CVE-2025-378xx/CVE-2025-37832.json) (`2025-06-04T08:15:21.743`)
- [CVE-2024-6538](CVE-2024/CVE-2024-65xx/CVE-2024-6538.json) (`2025-06-04T10:15:21.357`)
- [CVE-2025-37782](CVE-2025/CVE-2025-377xx/CVE-2025-37782.json) (`2025-06-04T11:15:21.673`)
## Download and Usage

View File

@ -121454,6 +121454,7 @@ CVE-2018-25108,0,0,b20ffbb6cbdeced293a2d0d5632cf118c9bcd4427f34608769eddf9c049b9
CVE-2018-25109,0,0,78a6fcfa9783d17890c8ccdbf5bd43dceffab865f734cb93193e2f03c25430f9,2025-03-23T23:15:13.060000
CVE-2018-25110,0,0,abecf77d0fbcf00bec56ae07fcdaac59d13802e5d641bed90dfb73d9379f33a8,2025-05-23T15:54:42.643000
CVE-2018-25111,0,0,d1d17366475e485173a544457112923af9883e4ce6e5838607a959f5a4b802a1,2025-06-02T17:32:17.397000
CVE-2018-25112,1,1,93ad48b186c456e0fd81f82a9c15fc00180f9fe62522f679230025a22ce63ee3,2025-06-04T10:15:20.380000
CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000
CVE-2018-2560,0,0,64c0ce8dd86b8cd41f028fc0faeb4c2703b3a3d6c99b5cfb7e065de6e8a10aab,2024-11-21T04:03:56.060000
CVE-2018-2561,0,0,03752647d2e63906688e002ddaaa7e85aba13094709fdf81fa6e8215efd59a07,2024-11-21T04:03:56.197000
@ -249133,7 +249134,7 @@ CVE-2024-13962,0,0,ea9d81d91a348a1fccf0a29b3d54407f74eaf1ed332ca23dd52e5162f21cb
CVE-2024-13964,0,0,0b3cec59b44d58c537c140b76cb5eed52f77b988e404c33ca119bbcb44531c40,2025-05-17T20:15:19.230000
CVE-2024-13965,0,0,696266c1e615339e2c74184825c7869048cb34652d675d1bb1be5959dc30273e,2025-05-17T20:15:19.317000
CVE-2024-13966,0,0,1e7c7434322ae48a12d12060d00ccb0202329621b4c00fb67abd63b41233b655,2025-05-28T19:15:35.940000
CVE-2024-13967,1,1,88a62faac054a08e568cb0e89617f4c9ca6f0d96cde36b43b9933345b083dbfc,2025-06-04T08:15:21.367000
CVE-2024-13967,0,0,88a62faac054a08e568cb0e89617f4c9ca6f0d96cde36b43b9933345b083dbfc,2025-06-04T08:15:21.367000
CVE-2024-1397,0,0,b23e8b9ccb5706ad3f8d257df0efb1d8013c2af60938dfd6b0df8c51fda39522,2025-01-22T17:41:19.017000
CVE-2024-1398,0,0,9645ba9f8586ede4d8e9304631788266d0cde74989f61af36e6ddca7859998d4,2025-01-08T18:39:21.643000
CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000
@ -279114,7 +279115,7 @@ CVE-2024-6533,0,0,7c76cd0497295bcea8ddaf17ea367bd3231a092d4f1d355ad959ac1bbed5a9
CVE-2024-6534,0,0,77773ba8637f01892ca3f6641fe8442e5c6280672a181b114b53032c7b4aca6d,2025-05-19T19:15:47.540000
CVE-2024-6535,0,0,44388289212b949983bbcb08fc4f387d14a7864b80be8ec8b5ccdce879cce735,2024-11-21T09:49:49.560000
CVE-2024-6536,0,0,4e1867493e6f7c1e950c15aa2768a98ac72cddbf5d06c6d2259320ca6542fdf4,2024-11-21T09:49:50.537000
CVE-2024-6538,0,0,2c696936cc4fa31d9ffe13c04e6d402da324c38b24c1ee7e007ddef2fa798bdc,2025-05-21T00:15:21.840000
CVE-2024-6538,0,1,f7440ea0b8cf2901f701aeb52d59c6d0dcf7f1ec4b01d2832ad6e6882f217cd6,2025-06-04T10:15:21.357000
CVE-2024-6539,0,0,488f82b4dd195018a4571a7b41599ab86771c19553aea6769341658d3043c227,2024-11-21T09:49:50.707000
CVE-2024-6540,0,0,f3ea6a455e292a17968899748da95526cfa3d10fdcac7853f32fce07f60e60be,2024-11-21T09:49:50.857000
CVE-2024-6542,0,0,95c08c38ec0cfe53af1e3f2fc6b95f2c5e43a181678f8155f2d77a836dccc44c,2024-11-21T09:49:50.997000
@ -289337,7 +289338,7 @@ CVE-2025-27440,0,0,86277272131892140b431c748dacaa4d43e60fedf1d6315607fc09340bd3b
CVE-2025-27441,0,0,79018b3b06a9e1f169848e8cfe5684a88b8ec611e0eecb9ae49cfed5e1cd7b23,2025-04-08T18:13:53.347000
CVE-2025-27442,0,0,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501ed9,2025-04-08T18:13:53.347000
CVE-2025-27443,0,0,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000
CVE-2025-27444,1,1,95dd66321c35391a8cf3b58a9acd74b89e40b0b508c1c51e78cb5304ac2a9740,2025-06-04T08:15:21.613000
CVE-2025-27444,0,0,95dd66321c35391a8cf3b58a9acd74b89e40b0b508c1c51e78cb5304ac2a9740,2025-06-04T08:15:21.613000
CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000
CVE-2025-27467,0,0,e305051e1a7dcf4291e11b8cd6f3091788c2ddeaf29bee2cf92ba70db3a6a044,2025-04-09T20:03:01.577000
CVE-2025-27468,0,0,dcaeee6f5e39787f02f391b688449bc9e36259b88e853d225eb70b8e9394d505,2025-05-19T18:22:00.040000
@ -293194,7 +293195,7 @@ CVE-2025-37778,0,0,3cdbb566719b7ca2d436a75de7cdf65e40806d44d237a4dd299477c86f354
CVE-2025-37779,0,0,f7f8b725e52c1609c167c7dfd7bfbee40482c20359fe76997973fd849c7a90a1,2025-05-02T13:53:20.943000
CVE-2025-37780,0,0,cd0a2af961fcad9423a173231341cd5d762f4739a678c5c5673333bb1f120eef,2025-05-02T13:53:20.943000
CVE-2025-37781,0,0,a44bb8b14a579ae4d75f6eef6cd1cba50d00f809da0416b4ad5fa1037f91c981,2025-05-02T13:53:20.943000
CVE-2025-37782,0,0,3f91690a6d840fb23bef57135c4978c954a5f146b8cef210a2710671986ade26,2025-05-02T13:53:20.943000
CVE-2025-37782,0,1,5409ef4569fab054a1288c9a894b055822ce58fa6042171764652b240fa95823,2025-06-04T11:15:21.673000
CVE-2025-37783,0,0,12e395808dd0a36b81c3ff441bbeffe9f373081c146e0a0a9e02a00a2ab9ed3b,2025-05-02T13:53:20.943000
CVE-2025-37784,0,0,096244f3457f9523c5220f8ad5cef1c295d74e16085b7f5e0d853f3738dafc6e,2025-05-02T13:53:20.943000
CVE-2025-37785,0,0,4e697d6d82e7172f54476520bd720db8b8bd91cd75962c19cef18481d74ee68c,2025-05-02T07:16:03.590000
@ -293248,7 +293249,7 @@ CVE-2025-37829,0,0,b003e966d7ca0f9f403c50eb7d8a02cd16d481323fbfe0f5fb10e449ad7ea
CVE-2025-3783,0,0,08564e7625cce7923d54746f30fbc8f13bf12d9607faa6a7346084b96420b3f3,2025-04-23T18:03:35.193000
CVE-2025-37830,0,0,7871ba7016e07cda0ac996bbbdb936f9c839fd7180e395b8e224083c0952e61c,2025-05-08T14:39:09.683000
CVE-2025-37831,0,0,8add769293519eb649322773bbc36e2896aa76e7c7f2f9866f01d932e01dd3bf,2025-05-08T14:39:09.683000
CVE-2025-37832,0,1,86c7088f302d72ddeddbef873d9d9fd22529524a30056ad131e7ae4fb85e4095,2025-06-04T08:15:21.743000
CVE-2025-37832,0,0,86c7088f302d72ddeddbef873d9d9fd22529524a30056ad131e7ae4fb85e4095,2025-06-04T08:15:21.743000
CVE-2025-37833,0,0,57554fe25fe5dbfac4d5daaf77cd500fee4ccf5b4933d414b3d8ebad075147d9,2025-05-08T14:39:09.683000
CVE-2025-37834,0,0,ab8baa5c719f3f2768d0dc997e843a3b224813e5d8ec32283bddca1456f04cf9,2025-05-08T14:39:09.683000
CVE-2025-37835,0,0,6725c148877e87dd1c04a498b1edde1ac8508bce4a2ad81f2426f150e5ad4dca,2025-05-10T14:15:32.750000
@ -295506,11 +295507,11 @@ CVE-2025-47709,0,0,9c00b271893f53d1f52294cb240e92548326ebdfcea3825170f6a366a64bc
CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d346e,2025-05-21T14:16:02.380000
CVE-2025-47710,0,0,3861e04e9e65074d020efa7dab9e00a25ecb80cf10fb272d3ea074fb3b627c14,2025-05-19T15:15:24.580000
CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000
CVE-2025-47724,1,1,356662c92cfe1531405b3dc36737a94136a96b945656bce7d35d9ff9a900d454,2025-06-04T08:15:21.867000
CVE-2025-47725,1,1,9308ff645f7d41a400c58e2d24a45e8d8369b5c840bb3b3d3898e81a9608c7b8,2025-06-04T08:15:22.057000
CVE-2025-47726,1,1,0171f1f25c67f0b9f6a26634c482206ad0694d14a0af6538135c408007afe6d1,2025-06-04T08:15:22.190000
CVE-2025-47727,1,1,0a58d7aff84a46074df0f158b644d00ecdc657301b54ecb30dfd1ac7b7fca595,2025-06-04T08:15:22.320000
CVE-2025-47728,1,1,4c0ef4dad5be6dd03712130b45816586981223bdfefdc0ada7b3205a22d096ae,2025-06-04T08:15:22.453000
CVE-2025-47724,0,0,356662c92cfe1531405b3dc36737a94136a96b945656bce7d35d9ff9a900d454,2025-06-04T08:15:21.867000
CVE-2025-47725,0,0,9308ff645f7d41a400c58e2d24a45e8d8369b5c840bb3b3d3898e81a9608c7b8,2025-06-04T08:15:22.057000
CVE-2025-47726,0,0,0171f1f25c67f0b9f6a26634c482206ad0694d14a0af6538135c408007afe6d1,2025-06-04T08:15:22.190000
CVE-2025-47727,0,0,0a58d7aff84a46074df0f158b644d00ecdc657301b54ecb30dfd1ac7b7fca595,2025-06-04T08:15:22.320000
CVE-2025-47728,0,0,4c0ef4dad5be6dd03712130b45816586981223bdfefdc0ada7b3205a22d096ae,2025-06-04T08:15:22.453000
CVE-2025-47729,0,0,5840dd56191421d2692f93cc2a1893a68781531005d1e7155e40c9e73a0b9865,2025-05-14T13:12:53.603000
CVE-2025-4773,0,0,f64a68d0e35e414617bee17967e5c3c9909f1d1c34fed1a1c8d53f16a98c123a,2025-05-21T14:34:08.967000
CVE-2025-47730,0,0,32919bd9d895e6a4d64320c41f6d81f839bd7e464e3e623f1b4fc5607c47e300,2025-05-08T14:39:09.683000
@ -296380,7 +296381,7 @@ CVE-2025-5445,0,0,4170f3c2f537d54cec187b705ba4828958c100062593b53f1a91ca989cc07f
CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a192,2025-06-02T17:32:17.397000
CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000
CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000
CVE-2025-5482,1,1,83d0f6229de344a3ff87ac74149e35d8119280f36f9106a32549ab2ab6965475,2025-06-04T08:15:22.613000
CVE-2025-5482,0,0,83d0f6229de344a3ff87ac74149e35d8119280f36f9106a32549ab2ab6965475,2025-06-04T08:15:22.613000
CVE-2025-5492,0,0,b5038878420625bb26f8489e550a4b7b6eed1512f61db614ac007c24853837c9,2025-06-03T11:15:21.023000
CVE-2025-5493,0,0,7c4c7427ac4f478c1fac76ad33eb9aa6e606061e63893081420b4dcedc256f44,2025-06-03T14:15:51.033000
CVE-2025-5495,0,0,43edca9627a89460bd01070c801d65887312b95c9d61a9db86524fe113b90a84,2025-06-03T14:15:51.170000
@ -296437,10 +296438,13 @@ CVE-2025-5572,0,0,b13d6d006dd98b8fc6e0aea31b7a364dc6a370978231e3a68f72d5508d2710
CVE-2025-5573,0,0,e11ff868d382d82e3502f73fbfa061e34c3bda72aa1c8eb9eac6468c7d5caa34,2025-06-04T06:15:22.677000
CVE-2025-5574,0,0,1a8a59e1fb49ea78ea53ddec9638a192402502820719c70c927f5ed7e4172f18,2025-06-04T07:15:23.060000
CVE-2025-5575,0,0,b4f360ded878f941dc681bf7e45141f9ee1edc00457c2628bd2b2982d6c479ae,2025-06-04T07:15:23.533000
CVE-2025-5576,1,1,b1312e317aef6bf56eb3237450f51695f7e490227f79f1ad00aa7861404534b5,2025-06-04T08:15:22.810000
CVE-2025-5577,1,1,9738c6c3077ef501d50cae557b808f7cffe5585a58c8fa527c752dc09e05afef,2025-06-04T08:15:22.997000
CVE-2025-5578,1,1,b5efa5a302f1ef5f80e55262ac516b04a64a1d4e4d49c4848d2c63b7e67fceff,2025-06-04T08:15:23.177000
CVE-2025-5579,1,1,b4ef0c7a641494a464cc35a23fba1574fa686d3a9e41f988bdcc4719d164da35,2025-06-04T08:15:23.360000
CVE-2025-5580,1,1,866378ce3d7c4dfdb774e09456e6b9f17f01b11d3f3b25f9a6fc31dd4fd424c1,2025-06-04T09:15:20.800000
CVE-2025-5581,1,1,cb5dd8bd11a61c024e6c526695b7a9f04a3a94d4060520f2e4a1660075297d59,2025-06-04T09:15:21.010000
CVE-2025-5582,1,1,dd333dc84f994e81fa23f36c784f5640cb66811571538f536d6a0a40a853a20d,2025-06-04T09:15:21.227000
CVE-2025-5576,0,0,b1312e317aef6bf56eb3237450f51695f7e490227f79f1ad00aa7861404534b5,2025-06-04T08:15:22.810000
CVE-2025-5577,0,0,9738c6c3077ef501d50cae557b808f7cffe5585a58c8fa527c752dc09e05afef,2025-06-04T08:15:22.997000
CVE-2025-5578,0,0,b5efa5a302f1ef5f80e55262ac516b04a64a1d4e4d49c4848d2c63b7e67fceff,2025-06-04T08:15:23.177000
CVE-2025-5579,0,0,b4ef0c7a641494a464cc35a23fba1574fa686d3a9e41f988bdcc4719d164da35,2025-06-04T08:15:23.360000
CVE-2025-5580,0,0,866378ce3d7c4dfdb774e09456e6b9f17f01b11d3f3b25f9a6fc31dd4fd424c1,2025-06-04T09:15:20.800000
CVE-2025-5581,0,0,cb5dd8bd11a61c024e6c526695b7a9f04a3a94d4060520f2e4a1660075297d59,2025-06-04T09:15:21.010000
CVE-2025-5582,0,0,dd333dc84f994e81fa23f36c784f5640cb66811571538f536d6a0a40a853a20d,2025-06-04T09:15:21.227000
CVE-2025-5583,1,1,d6c5ab1288fdf4d02127f96993f7a6a2045c26778c2ff6577da02cbee38dfeba,2025-06-04T10:15:21.640000
CVE-2025-5584,1,1,595d69f785fa4180f25c9f219bcece6562704ec6ce02a92df1130f12b60b3339,2025-06-04T10:15:21.870000
CVE-2025-5601,1,1,4a7648bdda6af4e29368e644b4aeae144c2d9f1f77b8ae4a2205a48d15208759,2025-06-04T11:15:22.110000

Can't render this file because it is too large.