diff --git a/CVE-2025/CVE-2025-46xx/CVE-2025-4664.json b/CVE-2025/CVE-2025-46xx/CVE-2025-4664.json index 2427b7499fa..31d7bb1ad22 100644 --- a/CVE-2025/CVE-2025-46xx/CVE-2025-4664.json +++ b/CVE-2025/CVE-2025-46xx/CVE-2025-4664.json @@ -2,7 +2,7 @@ "id": "CVE-2025-4664", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-05-14T18:15:33.867", - "lastModified": "2025-05-16T18:50:52.627", + "lastModified": "2025-06-06T01:00:02.617", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -59,10 +59,6 @@ } ] }, - "cisaExploitAdd": "2025-05-15", - "cisaActionDue": "2025-06-05", - "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "Google Chromium Loader Insufficient Policy Enforcement Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json index 34f1e4121b6..f0a21634a7c 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5419.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5419", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-06-03T00:15:21.043", - "lastModified": "2025-06-05T14:10:50.677", + "lastModified": "2025-06-06T01:00:03.300", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -39,6 +39,10 @@ } ] }, + "cisaExploitAdd": "2025-06-05", + "cisaActionDue": "2025-06-26", + "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Google Chromium V8 Out-of-Bounds Read and Write Vulnerability", "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5705.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5705.json new file mode 100644 index 00000000000..8f13f2d87ea --- /dev/null +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5705.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5705", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-06T00:15:33.750", + "lastModified": "2025-06-06T00:15:33.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Real Estate Property Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /Admin/Property.php. The manipulation of the argument cmbCat leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/kingmamalv/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311226", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311226", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590432", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5706.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5706.json new file mode 100644 index 00000000000..236186ec666 --- /dev/null +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5706.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5706", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-06T01:15:25.233", + "lastModified": "2025-06-06T01:15:25.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /new-user-testing.php. The manipulation of the argument state leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/55", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311227", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311227", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590461", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5707.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5707.json new file mode 100644 index 00000000000..77a70b69609 --- /dev/null +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5707.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5707", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-06T01:15:25.440", + "lastModified": "2025-06-06T01:15:25.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /registered-user-testing.php. The manipulation of the argument testtype leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/56", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311228", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311228", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590473", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5708.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5708.json new file mode 100644 index 00000000000..96829c21291 --- /dev/null +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5708.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-5708", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-06T01:15:25.630", + "lastModified": "2025-06-06T01:15:25.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in code-projects Real Estate Property Management System 1.0. This affects an unknown part of the file /Admin/NewsReport.php. The manipulation of the argument txtFrom leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YanHanQihomework/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.311229", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.311229", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590495", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590652", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c62c6f10148..24e55eaeec2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-05T23:55:19.221803+00:00 +2025-06-06T02:00:20.211086+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-05T23:15:22.613000+00:00 +2025-06-06T01:15:25.630000+00:00 ``` ### Last Data Feed Release @@ -27,31 +27,31 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-06-05T00:00:04.323256+00:00 +2025-06-06T00:00:04.332163+00:00 ``` ### Total Number of included CVEs ```plain -296615 +296619 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `4` -- [CVE-2025-49012](CVE-2025/CVE-2025-490xx/CVE-2025-49012.json) (`2025-06-05T23:15:21.303`) -- [CVE-2025-5696](CVE-2025/CVE-2025-56xx/CVE-2025-5696.json) (`2025-06-05T22:15:21.770`) -- [CVE-2025-5697](CVE-2025/CVE-2025-56xx/CVE-2025-5697.json) (`2025-06-05T22:15:22.760`) -- [CVE-2025-5698](CVE-2025/CVE-2025-56xx/CVE-2025-5698.json) (`2025-06-05T22:15:22.963`) -- [CVE-2025-5704](CVE-2025/CVE-2025-57xx/CVE-2025-5704.json) (`2025-06-05T23:15:22.613`) +- [CVE-2025-5705](CVE-2025/CVE-2025-57xx/CVE-2025-5705.json) (`2025-06-06T00:15:33.750`) +- [CVE-2025-5706](CVE-2025/CVE-2025-57xx/CVE-2025-5706.json) (`2025-06-06T01:15:25.233`) +- [CVE-2025-5707](CVE-2025/CVE-2025-57xx/CVE-2025-5707.json) (`2025-06-06T01:15:25.440`) +- [CVE-2025-5708](CVE-2025/CVE-2025-57xx/CVE-2025-5708.json) (`2025-06-06T01:15:25.630`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `2` -- [CVE-2025-5695](CVE-2025/CVE-2025-56xx/CVE-2025-5695.json) (`2025-06-05T23:15:22.413`) +- [CVE-2025-4664](CVE-2025/CVE-2025-46xx/CVE-2025-4664.json) (`2025-06-06T01:00:02.617`) +- [CVE-2025-5419](CVE-2025/CVE-2025-54xx/CVE-2025-5419.json) (`2025-06-06T01:00:03.300`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 8959c06e867..cb1da464de2 100644 --- a/_state.csv +++ b/_state.csv @@ -295097,7 +295097,7 @@ CVE-2025-46632,0,0,0bf5e14d2a9861100f068ef9191d439e475832a5082afd70556ba0f5d20a6 CVE-2025-46633,0,0,b92f3e99ef5a6cd524565a81957289165fe9f2e810843a53729ae762f5459fec,2025-05-27T14:17:34.780000 CVE-2025-46634,0,0,adbdc53bb91ce45c108dfae363ac172a5467f9ef6b9ad8bfd5e234ff22520926,2025-05-27T14:18:00.567000 CVE-2025-46635,0,0,c81a16a7aac883be5eb8baced44885a6963efe19158222244e53c4c42c8380a1,2025-05-27T14:18:12.740000 -CVE-2025-4664,0,0,be0cfd9c113f34f28c3dc7774da6b1ef5260ce136a09f50ea1ff6b3f09d0d19f,2025-05-16T18:50:52.627000 +CVE-2025-4664,0,1,d4044bce681082456ae2ed2a3baaa6f65e61937d9e24855cf4b96203efa26903,2025-06-06T01:00:02.617000 CVE-2025-46646,0,0,777aacedd29eb87d2f3d4179421a3b07a825895319bd1804480c003b4bbcf895,2025-04-29T13:52:10.697000 CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000 CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000 @@ -296068,7 +296068,7 @@ CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd3 CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000 CVE-2025-49009,0,0,76d8be196b9fa55d517dc826120ab50a9788f285be9ce66c1a1960b2443dc26c,2025-06-05T20:12:23.777000 CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000 -CVE-2025-49012,1,1,1be13c91eb4fa86227f34f5987af65aae5cf2d8b3394e033a1c37716707933fd,2025-06-05T23:15:21.303000 +CVE-2025-49012,0,0,1be13c91eb4fa86227f34f5987af65aae5cf2d8b3394e033a1c37716707933fd,2025-06-05T23:15:21.303000 CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000 CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000 CVE-2025-4904,0,0,d7b6b9c62b4fa4e81411d46fa975a661fdf9f9acbbbf9c59e6a55eeb063418e5,2025-05-27T16:29:33.560000 @@ -296419,7 +296419,7 @@ CVE-2025-5409,0,0,209b521ab5ccc30904997673163794c81e8bbcd661514ad5d6db90496c692a CVE-2025-5410,0,0,8f6aec665b1901bf160e99989f915904c0b12f976e27a46b4117cb6a4d26984d,2025-06-02T17:32:17.397000 CVE-2025-5411,0,0,bda57e821f06e7acb04b67298784cbbe1631c5e86f17b6a45cfc7ca79da6e664,2025-06-02T17:32:17.397000 CVE-2025-5412,0,0,753b4152a593f449df2c00057cf330d4f98993025991e4c159242de574477a9d,2025-06-02T17:32:17.397000 -CVE-2025-5419,0,0,736261d760fc912c63cf9b464b02112a53c465ae1b86fd43466b5f099563f5f2,2025-06-05T14:10:50.677000 +CVE-2025-5419,0,1,36b3b4fd8694c8182e333b12d51dc519287ba680aafbb848dd210da76090343d,2025-06-06T01:00:03.300000 CVE-2025-5420,0,0,febb25c16bce360c4a759b2a4127c671c1e4f8d4aafbd5e7bf731b1578cd725f,2025-06-02T17:32:17.397000 CVE-2025-5421,0,0,aaf7308ceb57221ad68dbb7db22ba2000af542ccf461039f6c7d796fca57cef7,2025-06-02T17:32:17.397000 CVE-2025-5422,0,0,9e450c046e1f91b7dd55771f187d3de2563113f044a3b50f5e4e98096355fb9a,2025-06-02T17:32:17.397000 @@ -296606,11 +296606,15 @@ CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a52 CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000 CVE-2025-5693,0,0,73ee6abfd203da68e2c70f3b21c71009f66bd2babb7c5a3cb5b33a3a3f586bf3,2025-06-05T20:15:27.193000 CVE-2025-5694,0,0,14769e93de6a9a8f2a958971346f4979ed23bae934d0b6341a098f8ad57aee98,2025-06-05T21:15:22.510000 -CVE-2025-5695,0,1,063f24d0c2b1152f4531ba63d7cdd6a17fbb245b44cbd467b6e26c695332360f,2025-06-05T23:15:22.413000 -CVE-2025-5696,1,1,0347b4cba043d5ba1e68709292fc67d2e42e886a13ba655971fee5068f4d39bb,2025-06-05T22:15:21.770000 -CVE-2025-5697,1,1,65255ba505c3d3bfa33ff57560884cd8e0bdaf4e8acec4cb7c5189e886e27235,2025-06-05T22:15:22.760000 -CVE-2025-5698,1,1,3bc6d68f8bac4465e140c6fad804f5cb232019488237f1cd169082769509a350,2025-06-05T22:15:22.963000 +CVE-2025-5695,0,0,063f24d0c2b1152f4531ba63d7cdd6a17fbb245b44cbd467b6e26c695332360f,2025-06-05T23:15:22.413000 +CVE-2025-5696,0,0,0347b4cba043d5ba1e68709292fc67d2e42e886a13ba655971fee5068f4d39bb,2025-06-05T22:15:21.770000 +CVE-2025-5697,0,0,65255ba505c3d3bfa33ff57560884cd8e0bdaf4e8acec4cb7c5189e886e27235,2025-06-05T22:15:22.760000 +CVE-2025-5698,0,0,3bc6d68f8bac4465e140c6fad804f5cb232019488237f1cd169082769509a350,2025-06-05T22:15:22.963000 CVE-2025-5701,0,0,4e463ab950f8de8dad2504c9adb1bf69b81ba722d49ef312bfe8e0759a419475,2025-06-05T20:12:23.777000 CVE-2025-5702,0,0,ee47ef64676a08151d4b3eb2425d567b0db2b91fed39f1554b45738f903b4519,2025-06-05T21:15:22.873000 -CVE-2025-5704,1,1,04beee8a3eb537701c59a3d3797878b13a52af2c4eb1c98a2bf9ef70bf69db6a,2025-06-05T23:15:22.613000 +CVE-2025-5704,0,0,04beee8a3eb537701c59a3d3797878b13a52af2c4eb1c98a2bf9ef70bf69db6a,2025-06-05T23:15:22.613000 +CVE-2025-5705,1,1,0ff358d25cdbb96d1c496b09520f013c9f6b28418dd17b468ae2205989a211b4,2025-06-06T00:15:33.750000 +CVE-2025-5706,1,1,69c700685b786445db1c34156db2d8aaab66cbb1389db417b2eef29b7620471b,2025-06-06T01:15:25.233000 +CVE-2025-5707,1,1,f4593f842da197a203ef3a1f4001e4a533245929a189587ec24de709f5bef4fc,2025-06-06T01:15:25.440000 +CVE-2025-5708,1,1,bd1bb4b05969bea723151eac155c7e23970334229192788accb8a41f85a57d9a,2025-06-06T01:15:25.630000 CVE-2025-5745,0,0,a48c97f3295325ba0b67cceb39fcc754c3ef6872892d5057110c8e62080215c2,2025-06-05T21:15:23.023000