From 7d7e8367f66e0ad57d83634aa94a1972a0d71995 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 25 Jun 2025 14:04:04 +0000 Subject: [PATCH] Auto-Update: 2025-06-25T14:00:27.481340+00:00 --- CVE-2023/CVE-2023-470xx/CVE-2023-47030.json | 31 ++++- CVE-2023/CVE-2023-470xx/CVE-2023-47031.json | 36 ++++- CVE-2023/CVE-2023-470xx/CVE-2023-47032.json | 31 ++++- CVE-2023/CVE-2023-472xx/CVE-2023-47295.json | 31 ++++- CVE-2024/CVE-2024-519xx/CVE-2024-51978.json | 6 +- CVE-2024/CVE-2024-519xx/CVE-2024-51979.json | 6 +- CVE-2024/CVE-2024-519xx/CVE-2024-51980.json | 6 +- CVE-2024/CVE-2024-519xx/CVE-2024-51981.json | 6 +- CVE-2024/CVE-2024-519xx/CVE-2024-51982.json | 6 +- CVE-2024/CVE-2024-519xx/CVE-2024-51983.json | 6 +- CVE-2024/CVE-2024-519xx/CVE-2024-51984.json | 6 +- CVE-2025/CVE-2025-250xx/CVE-2025-25012.json | 56 ++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34031.json | 10 +- CVE-2025/CVE-2025-340xx/CVE-2025-34032.json | 10 +- CVE-2025/CVE-2025-484xx/CVE-2025-48466.json | 18 ++- CVE-2025/CVE-2025-484xx/CVE-2025-48469.json | 18 ++- CVE-2025/CVE-2025-484xx/CVE-2025-48470.json | 18 ++- CVE-2025/CVE-2025-503xx/CVE-2025-50348.json | 33 ++++- CVE-2025/CVE-2025-503xx/CVE-2025-50349.json | 33 ++++- CVE-2025/CVE-2025-64xx/CVE-2025-6424.json | 43 +++++- CVE-2025/CVE-2025-64xx/CVE-2025-6431.json | 43 +++++- CVE-2025/CVE-2025-64xx/CVE-2025-6433.json | 43 +++++- CVE-2025/CVE-2025-65xx/CVE-2025-6534.json | 14 +- CVE-2025/CVE-2025-65xx/CVE-2025-6543.json | 78 +++++++++++ CVE-2025/CVE-2025-66xx/CVE-2025-6604.json | 145 ++++++++++++++++++++ README.md | 42 ++++-- _state.csv | 61 ++++---- 27 files changed, 749 insertions(+), 87 deletions(-) create mode 100644 CVE-2025/CVE-2025-250xx/CVE-2025-25012.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6543.json create mode 100644 CVE-2025/CVE-2025-66xx/CVE-2025-6604.json diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47030.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47030.json index 693f972dbad..01d45644785 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47030.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47030.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47030", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T20:15:27.740", - "lastModified": "2025-06-24T18:15:23.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-25T12:50:37.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1ujUcB8XEs78WwWzs8cmD-u1Twqi10yEh/view?usp=sharing", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47030/CVE-2023-47030.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47031.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47031.json index 442d87a4a78..8155155bcdc 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47031.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47031.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47031", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T17:15:27.313", - "lastModified": "2025-06-24T18:15:23.563", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-25T13:13:50.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09" + } + ] + } + ] + } + ], "references": [ { "url": "http://ncr.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://terminal.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://drive.google.com/file/d/1f9riw_seicV9MB7pRQJFY-8voxkW8ZYH/view?usp=sharing", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47032.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47032.json index b7870d8460e..8dd0890bfee 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47032.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47032.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47032", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T16:15:23.920", - "lastModified": "2025-06-24T18:15:23.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-25T13:32:01.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1rTKc2nxEc40VTItJiJ9moZ5VrHG3xQuj/view?usp=sharing", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47032/CVE-2023-47032.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47295.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47295.json index 3f17df0e203..fdaba271c17 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47295.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47295.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47295", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T16:15:24.623", - "lastModified": "2025-06-24T18:15:23.893", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-25T13:30:08.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/14uldfUpLRIc-NfHiUco0ja-ZiF0MazGA/view?usp=sharing", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47295/CVE-2023-47295.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51978.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51978.json index cf60d6e65c5..8d05090162d 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51978.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51978.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51978", "sourceIdentifier": "cve@rapid7.com", "published": "2025-06-25T08:15:31.223", - "lastModified": "2025-06-25T08:15:31.223", + "lastModified": "2025-06-25T13:15:20.717", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -71,6 +71,10 @@ { "url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed", "source": "cve@rapid7.com" + }, + { + "url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51979.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51979.json index fb4a950fdd2..7f11cbcf5cc 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51979.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51979.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51979", "sourceIdentifier": "cve@rapid7.com", "published": "2025-06-25T08:15:31.590", - "lastModified": "2025-06-25T08:15:31.590", + "lastModified": "2025-06-25T13:15:21.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -71,6 +71,10 @@ { "url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed", "source": "cve@rapid7.com" + }, + { + "url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51980.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51980.json index e8e2045949d..a039062c098 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51980.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51980.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51980", "sourceIdentifier": "cve@rapid7.com", "published": "2025-06-25T08:15:31.930", - "lastModified": "2025-06-25T08:15:31.930", + "lastModified": "2025-06-25T13:15:22.203", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -71,6 +71,10 @@ { "url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed", "source": "cve@rapid7.com" + }, + { + "url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51981.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51981.json index edb46460a24..9222995a33d 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51981.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51981.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51981", "sourceIdentifier": "cve@rapid7.com", "published": "2025-06-25T08:15:32.293", - "lastModified": "2025-06-25T08:15:32.293", + "lastModified": "2025-06-25T13:15:22.677", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -75,6 +75,10 @@ { "url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed", "source": "cve@rapid7.com" + }, + { + "url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51982.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51982.json index 2da52d62dff..079ed87e07d 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51982.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51982.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51982", "sourceIdentifier": "cve@rapid7.com", "published": "2025-06-25T08:15:32.650", - "lastModified": "2025-06-25T08:15:32.650", + "lastModified": "2025-06-25T13:15:23.133", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -63,6 +63,10 @@ { "url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed", "source": "cve@rapid7.com" + }, + { + "url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51983.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51983.json index baf62e14ddd..f9c82de8bf0 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51983.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51983.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51983", "sourceIdentifier": "cve@rapid7.com", "published": "2025-06-25T08:15:32.873", - "lastModified": "2025-06-25T08:15:32.873", + "lastModified": "2025-06-25T13:15:23.377", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -67,6 +67,10 @@ { "url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed", "source": "cve@rapid7.com" + }, + { + "url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-519xx/CVE-2024-51984.json b/CVE-2024/CVE-2024-519xx/CVE-2024-51984.json index a95a636a61e..0be597a9af2 100644 --- a/CVE-2024/CVE-2024-519xx/CVE-2024-51984.json +++ b/CVE-2024/CVE-2024-519xx/CVE-2024-51984.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51984", "sourceIdentifier": "cve@rapid7.com", "published": "2025-06-25T08:15:33.220", - "lastModified": "2025-06-25T08:15:33.220", + "lastModified": "2025-06-25T13:15:23.900", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -71,6 +71,10 @@ { "url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed", "source": "cve@rapid7.com" + }, + { + "url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25012.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25012.json new file mode 100644 index 00000000000..60cc838a231 --- /dev/null +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25012.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25012", + "sourceIdentifier": "bressers@elastic.co", + "published": "2025-06-25T12:15:19.920", + "lastModified": "2025-06-25T12:15:19.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "URL redirection to an untrusted site ('Open Redirect') in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/kibana-7-17-29-8-17-8-8-18-3-9-0-3-security-update-esa-2025-10/379444", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34031.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34031.json index eb13c11776c..eb27c34bce9 100644 --- a/CVE-2025/CVE-2025-340xx/CVE-2025-34031.json +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34031.json @@ -2,13 +2,17 @@ "id": "CVE-2025-34031", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-06-24T01:15:23.340", - "lastModified": "2025-06-24T03:15:32.860", + "lastModified": "2025-06-25T13:15:25.270", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en el complemento Moodle LMS Jmol versi\u00f3n 6.1 y anteriores mediante el par\u00e1metro de consulta en jsmol.php. El script pasa directamente la entrada del usuario a la funci\u00f3n file_get_contents() sin la validaci\u00f3n adecuada, lo que permite a los atacantes leer archivos arbitrarios del sistema de archivos del servidor mediante la manipulaci\u00f3n de un valor de consulta malicioso. Esta vulnerabilidad puede explotarse sin autenticaci\u00f3n y puede exponer datos de configuraci\u00f3n confidenciales, incluidas las credenciales de la base de datos." } ], "metrics": { @@ -89,6 +93,10 @@ { "url": "https://www.exploit-db.com/exploits/46881", "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/46881", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34032.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34032.json index 20d22908b88..f4f6b72a5ef 100644 --- a/CVE-2025/CVE-2025-340xx/CVE-2025-34032.json +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34032.json @@ -2,13 +2,17 @@ "id": "CVE-2025-34032", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-06-24T01:15:24.350", - "lastModified": "2025-06-24T03:15:32.987", + "lastModified": "2025-06-25T13:15:25.400", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) reflejado en el complemento Moodle LMS Jmol versi\u00f3n 6.1 y anteriores a trav\u00e9s del par\u00e1metro data en jsmol.php. La aplicaci\u00f3n no depura correctamente la entrada del usuario antes de incrustarla en la respuesta HTTP, lo que permite a un atacante ejecutar JavaScript arbitrario en el navegador de la v\u00edctima mediante la manipulaci\u00f3n de un enlace malicioso. Esto puede utilizarse para secuestrar sesiones de usuario o manipular el contenido de la p\u00e1gina." } ], "metrics": { @@ -85,6 +89,10 @@ { "url": "https://www.exploit-db.com/exploits/46881", "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.exploit-db.com/exploits/46881", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48466.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48466.json index a4adae4c6be..4826aea055d 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48466.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48466.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48466", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:34.013", - "lastModified": "2025-06-24T03:15:34.013", + "lastModified": "2025-06-25T13:15:26.133", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks." + }, + { + "lang": "es", + "value": "La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir que un atacante remoto no autenticado env\u00ede paquetes Modbus TCP para manipular salidas digitales, lo que potencialmente permitir\u00eda el control remoto del canal de rel\u00e9 que podr\u00eda generar riesgos operativos o de seguridad." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://github.com/shipcod3/CVE-2025-48466", diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48469.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48469.json index 26d5bd28f36..05fbf7e6fdc 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48469.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48469.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48469", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:34.390", - "lastModified": "2025-06-24T03:15:34.390", + "lastModified": "2025-06-25T13:15:26.273", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload firmware through a public update page, potentially leading to backdoor installation or privilege escalation." + }, + { + "lang": "es", + "value": "La explotaci\u00f3n exitosa de la vulnerabilidad podr\u00eda permitir que un atacante no autenticado cargue firmware a trav\u00e9s de una p\u00e1gina de actualizaci\u00f3n p\u00fablica, lo que podr\u00eda conducir a la instalaci\u00f3n de una puerta trasera o a una escalada de privilegios." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://jro.sg/CVEs/CVE-2025-48469/", diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48470.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48470.json index 9118f3f43c7..28f01e6e017 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48470.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48470.json @@ -2,13 +2,17 @@ "id": "CVE-2025-48470", "sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4", "published": "2025-06-24T03:15:34.523", - "lastModified": "2025-06-24T03:15:34.523", + "lastModified": "2025-06-25T13:15:26.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users\u2019 browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation." + }, + { + "lang": "es", + "value": "La explotaci\u00f3n exitosa de la vulnerabilidad de cross-site scripting almacenado podr\u00eda permitir a un atacante inyectar secuencias de comandos maliciosas en los campos del dispositivo y ejecutarlas en el navegador de otros usuarios, lo que podr\u00eda conducir al secuestro de sesi\u00f3n, desfiguraci\u00f3n, robo de credenciales o escalada de privilegios. " } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061", diff --git a/CVE-2025/CVE-2025-503xx/CVE-2025-50348.json b/CVE-2025/CVE-2025-503xx/CVE-2025-50348.json index 3be9f2d284a..ef6b3c7de08 100644 --- a/CVE-2025/CVE-2025-503xx/CVE-2025-50348.json +++ b/CVE-2025/CVE-2025-503xx/CVE-2025-50348.json @@ -2,8 +2,8 @@ "id": "CVE-2025-50348", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T19:15:24.647", - "lastModified": "2025-06-24T18:15:25.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-25T13:08:13.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA2ED32-BA35-4D09-A99F-13998D3C19CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-3.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-3.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-503xx/CVE-2025-50349.json b/CVE-2025/CVE-2025-503xx/CVE-2025-50349.json index 8c0ebaa01a6..62dc720ed1d 100644 --- a/CVE-2025/CVE-2025-503xx/CVE-2025-50349.json +++ b/CVE-2025/CVE-2025-503xx/CVE-2025-50349.json @@ -2,8 +2,8 @@ "id": "CVE-2025-50349", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-23T19:15:24.787", - "lastModified": "2025-06-24T18:15:25.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-25T13:01:11.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA2ED32-BA35-4D09-A99F-13998D3C19CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-4.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-4.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6424.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6424.json index 6150258597d..d9cac113271 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6424.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6424.json @@ -2,16 +2,55 @@ "id": "CVE-2025-6424", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-24T13:15:23.273", - "lastModified": "2025-06-24T13:15:23.273", + "lastModified": "2025-06-25T13:15:26.633", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12." + }, + { + "lang": "es", + "value": "Use-after-free en FontFaceSet provoc\u00f3 un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox < 140, Firefox ESR < 115.25 y Firefox ESR < 128.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1966423", diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6431.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6431.json index 0fd869957fd..3926ec2cf20 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6431.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6431.json @@ -2,16 +2,55 @@ "id": "CVE-2025-6431", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-24T13:15:24.103", - "lastModified": "2025-06-24T13:15:24.103", + "lastModified": "2025-06-25T13:15:26.800", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When a link can be opened in an external application, Firefox for Android will, by default, prompt the user before doing so. An attacker could have bypassed this prompt, potentially exposing the user to security vulnerabilities or privacy leaks in external applications. \n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 140." + }, + { + "lang": "es", + "value": "Cuando se puede abrir un enlace en una aplicaci\u00f3n externa, Firefox para Android, por defecto, pregunta al usuario antes de hacerlo. Un atacante podr\u00eda haber omitido esta pregunta, exponiendo al usuario a vulnerabilidades de seguridad o filtraciones de privacidad en aplicaciones externas. *Este error solo afecta a Firefox para Android. Las dem\u00e1s versiones de Firefox no se ven afectadas.* Esta vulnerabilidad afecta a Firefox anteriores a la versi\u00f3n 140." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1942716", diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6433.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6433.json index 10c4deffdfd..5bb18f14f60 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6433.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6433.json @@ -2,16 +2,55 @@ "id": "CVE-2025-6433", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-24T13:15:24.327", - "lastModified": "2025-06-24T13:15:24.327", + "lastModified": "2025-06-25T13:15:26.977", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to complete. This is in violation of the WebAuthN spec which requires \"a secure transport established without errors\". This vulnerability affects Firefox < 140." + }, + { + "lang": "es", + "value": "Si un usuario visitaba una p\u00e1gina web con un certificado TLS no v\u00e1lido y conced\u00eda una excepci\u00f3n, la p\u00e1gina web pod\u00eda generar un desaf\u00edo de WebAuthN que el usuario deb\u00eda completar. Esto infringe la especificaci\u00f3n de WebAuthN, que exige \"un transporte seguro establecido sin errores\". Esta vulnerabilidad afecta a Firefox anterior a la versi\u00f3n 140." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1954033", diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6534.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6534.json index 94b84d69eee..aced0ad4992 100644 --- a/CVE-2025/CVE-2025-65xx/CVE-2025-6534.json +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6534.json @@ -2,13 +2,17 @@ "id": "CVE-2025-6534", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-24T01:15:25.303", - "lastModified": "2025-06-24T01:15:25.303", + "lastModified": "2025-06-25T13:15:27.137", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in xxyopen/201206030 novel-plus up to 5.1.3. This affects the function remove of the file novel-admin/src/main/java/com/java2nb/common/controller/FileController.java of the component File Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en xxyopen/201206030 novel-plus hasta la versi\u00f3n 5.1.3. Esta vulnerabilidad afecta la funci\u00f3n de eliminaci\u00f3n del archivo novel-admin/src/main/java/com/java2nb/common/controller/FileController.java del componente File Handler. La manipulaci\u00f3n conlleva un control indebido de los identificadores de recursos. Es posible iniciar el ataque de forma remota. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.596505", "source": "cna@vuldb.com" + }, + { + "url": "https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6543.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6543.json new file mode 100644 index 00000000000..42f7755a4b8 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6543.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-6543", + "sourceIdentifier": "secure@citrix.com", + "published": "2025-06-25T13:15:27.293", + "lastModified": "2025-06-25T13:15:27.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when\u00a0configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6604.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6604.json new file mode 100644 index 00000000000..04c72bf111f --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6604.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6604", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-25T13:15:27.557", + "lastModified": "2025-06-25T13:15:27.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. This affects an unknown part of the file /panel/add-staff.php. The manipulation of the argument Name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/SQL-5.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313821", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313821", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.601913", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 49d95796668..6377dbdbc62 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-25T12:00:26.161381+00:00 +2025-06-25T14:00:27.481340+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-25T11:15:22.193000+00:00 +2025-06-25T13:32:01.277000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299278 +299281 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `3` -- [CVE-2025-41255](CVE-2025/CVE-2025-412xx/CVE-2025-41255.json) (`2025-06-25T10:15:21.783`) -- [CVE-2025-41256](CVE-2025/CVE-2025-412xx/CVE-2025-41256.json) (`2025-06-25T10:15:22.610`) -- [CVE-2025-41647](CVE-2025/CVE-2025-416xx/CVE-2025-41647.json) (`2025-06-25T10:15:22.747`) -- [CVE-2025-49797](CVE-2025/CVE-2025-497xx/CVE-2025-49797.json) (`2025-06-25T10:15:22.910`) -- [CVE-2025-5927](CVE-2025/CVE-2025-59xx/CVE-2025-5927.json) (`2025-06-25T10:15:23.090`) -- [CVE-2025-6603](CVE-2025/CVE-2025-66xx/CVE-2025-6603.json) (`2025-06-25T11:15:22.193`) -- [CVE-2025-6613](CVE-2025/CVE-2025-66xx/CVE-2025-6613.json) (`2025-06-25T10:15:23.253`) +- [CVE-2025-25012](CVE-2025/CVE-2025-250xx/CVE-2025-25012.json) (`2025-06-25T12:15:19.920`) +- [CVE-2025-6543](CVE-2025/CVE-2025-65xx/CVE-2025-6543.json) (`2025-06-25T13:15:27.293`) +- [CVE-2025-6604](CVE-2025/CVE-2025-66xx/CVE-2025-6604.json) (`2025-06-25T13:15:27.557`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `22` +- [CVE-2023-47030](CVE-2023/CVE-2023-470xx/CVE-2023-47030.json) (`2025-06-25T12:50:37.217`) +- [CVE-2023-47031](CVE-2023/CVE-2023-470xx/CVE-2023-47031.json) (`2025-06-25T13:13:50.157`) +- [CVE-2023-47032](CVE-2023/CVE-2023-470xx/CVE-2023-47032.json) (`2025-06-25T13:32:01.277`) +- [CVE-2023-47295](CVE-2023/CVE-2023-472xx/CVE-2023-47295.json) (`2025-06-25T13:30:08.523`) +- [CVE-2024-51978](CVE-2024/CVE-2024-519xx/CVE-2024-51978.json) (`2025-06-25T13:15:20.717`) +- [CVE-2024-51979](CVE-2024/CVE-2024-519xx/CVE-2024-51979.json) (`2025-06-25T13:15:21.790`) +- [CVE-2024-51980](CVE-2024/CVE-2024-519xx/CVE-2024-51980.json) (`2025-06-25T13:15:22.203`) +- [CVE-2024-51981](CVE-2024/CVE-2024-519xx/CVE-2024-51981.json) (`2025-06-25T13:15:22.677`) +- [CVE-2024-51982](CVE-2024/CVE-2024-519xx/CVE-2024-51982.json) (`2025-06-25T13:15:23.133`) +- [CVE-2024-51983](CVE-2024/CVE-2024-519xx/CVE-2024-51983.json) (`2025-06-25T13:15:23.377`) +- [CVE-2024-51984](CVE-2024/CVE-2024-519xx/CVE-2024-51984.json) (`2025-06-25T13:15:23.900`) +- [CVE-2025-34031](CVE-2025/CVE-2025-340xx/CVE-2025-34031.json) (`2025-06-25T13:15:25.270`) +- [CVE-2025-34032](CVE-2025/CVE-2025-340xx/CVE-2025-34032.json) (`2025-06-25T13:15:25.400`) +- [CVE-2025-48466](CVE-2025/CVE-2025-484xx/CVE-2025-48466.json) (`2025-06-25T13:15:26.133`) +- [CVE-2025-48469](CVE-2025/CVE-2025-484xx/CVE-2025-48469.json) (`2025-06-25T13:15:26.273`) +- [CVE-2025-48470](CVE-2025/CVE-2025-484xx/CVE-2025-48470.json) (`2025-06-25T13:15:26.410`) +- [CVE-2025-50348](CVE-2025/CVE-2025-503xx/CVE-2025-50348.json) (`2025-06-25T13:08:13.867`) +- [CVE-2025-50349](CVE-2025/CVE-2025-503xx/CVE-2025-50349.json) (`2025-06-25T13:01:11.240`) +- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-06-25T13:15:26.633`) +- [CVE-2025-6431](CVE-2025/CVE-2025-64xx/CVE-2025-6431.json) (`2025-06-25T13:15:26.800`) +- [CVE-2025-6433](CVE-2025/CVE-2025-64xx/CVE-2025-6433.json) (`2025-06-25T13:15:26.977`) +- [CVE-2025-6534](CVE-2025/CVE-2025-65xx/CVE-2025-6534.json) (`2025-06-25T13:15:27.137`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 71d11ca896b..38720a7525b 100644 --- a/_state.csv +++ b/_state.csv @@ -237904,9 +237904,9 @@ CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25 CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000 CVE-2023-47029,0,0,12b49b3ede09c8051f0adf031401d06f966f450320e558466627896d3b8f70e3,2025-06-23T20:16:21.633000 CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000 -CVE-2023-47030,0,0,ee90a36dfc63d39b5c6737d0f0403f4137bce21157cbc095a67d4039da28da25,2025-06-24T18:15:23.003000 -CVE-2023-47031,0,0,8c355c94ea255597d7cb2c2cedcc31b6f0c5e4c2f796647a5bcdfb2cafe77d57,2025-06-24T18:15:23.563000 -CVE-2023-47032,0,0,ab1b52e064cb5253285a61f10d0988b397ce325e3f6846f306333001f10f5273,2025-06-24T18:15:23.730000 +CVE-2023-47030,0,1,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000 +CVE-2023-47031,0,1,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000 +CVE-2023-47032,0,1,bacc5086cd0fda0d398c9333a36399e96f47e02b2b92f2e92d77083955e738c6,2025-06-25T13:32:01.277000 CVE-2023-47033,0,0,617818e306c20ade59924bf4bbac6b004808fa5a2cfbab4ec0f03a5ee1b8b8ca,2025-05-30T15:15:23.810000 CVE-2023-47034,0,0,6a1f244f30344c3a3a74d180948a6a04b3859761d9cd9932f89f0d7068dfd697,2024-11-21T08:29:38.427000 CVE-2023-47035,0,0,81ca6ef6853b599b11605e195d2498aff6e67a10accc5ef3988bd57869c19cef,2025-05-30T15:15:24.013000 @@ -238138,7 +238138,7 @@ CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000 CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000 CVE-2023-47294,0,0,d3ea47b285562c39058a8eacb339c5fa3addec63cf1a3e5b9333a2e4450da9ee,2025-06-23T20:16:21.633000 -CVE-2023-47295,0,0,b4a5a5866365997d4b67d82b14a920f11d08b865f6fbb000c9018e6db15b352d,2025-06-24T18:15:23.893000 +CVE-2023-47295,0,1,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000 CVE-2023-47297,0,0,8949ada58483b5ab75d0893499dc33e938392dca9ba71df8235231fd2dbaa934,2025-06-24T18:15:24.060000 CVE-2023-47298,0,0,c409530cf61d56b21c99c649ee44169bc5e7d2ee17a3a9ef9a5831f4a402984b,2025-06-24T16:15:23.940000 CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000 @@ -274829,14 +274829,14 @@ CVE-2024-51963,0,0,65d15561511f4792024c62d0c3dbbe1a84656f415b27a24cc7fcb099d4df1 CVE-2024-51966,0,0,69a0d46bcaa28466534ecd74cb2be650273566964ba1c75d7e0cb22b97d45b63,2025-04-10T20:15:21.850000 CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000 CVE-2024-51977,0,0,6f38658394725c55998fb8fb4c547765adae4f5bfc0f1b441e5f316f5094f7df,2025-06-25T08:15:30.053000 -CVE-2024-51978,0,0,44f28670ba4aad01b2cab1e0a17e8fb3344218487bfaa21f545b2957b78b1aeb,2025-06-25T08:15:31.223000 -CVE-2024-51979,0,0,7429856c2cab5ae7d15707bbef67ec808b2f44a2637525d216353bef0260aa8b,2025-06-25T08:15:31.590000 +CVE-2024-51978,0,1,d44b0cb729e7cd696172a236e99f532d446a4a53474bf05684dfd78a11be47d6,2025-06-25T13:15:20.717000 +CVE-2024-51979,0,1,04bf702ad651656976f29cdcae61c0e3e2e9a3e657ff9b88c97cf67bf1bb262f,2025-06-25T13:15:21.790000 CVE-2024-5198,0,0,3fa9ec394e1888d66e83812554066b455d9458d73cda1ea9275cc8bdd128d3dc,2025-06-10T16:12:09.340000 -CVE-2024-51980,0,0,b18f64f7aa3048ec39d082a8669a7bf601251b6412a7b23ebac6c2d1ee2e0ba1,2025-06-25T08:15:31.930000 -CVE-2024-51981,0,0,980109182d9945f2520d085055b44b201830eb4e90fa94fff4458383987395f6,2025-06-25T08:15:32.293000 -CVE-2024-51982,0,0,06f6a1e27a95c32cb69b28782e5d6615d8c28e7f8c2b84931342b03b5deac10e,2025-06-25T08:15:32.650000 -CVE-2024-51983,0,0,36bcfba68c3a049625884d1458380ec3cfbbad4ef01aed8743fe39304244919a,2025-06-25T08:15:32.873000 -CVE-2024-51984,0,0,31dbf56b669052fe1f240085e00dd9f82b12f4346271534902d4591059b5ddd1,2025-06-25T08:15:33.220000 +CVE-2024-51980,0,1,6d10bfcf86832faf46af355a7aa26eff84d97c03c8138abcea972409ecbc69ec,2025-06-25T13:15:22.203000 +CVE-2024-51981,0,1,72ddbd3bfa6041b937ecf18a390d4a284a967c5c635371727ce70c88313d691d,2025-06-25T13:15:22.677000 +CVE-2024-51982,0,1,27746e69663bb58bd06458c806ed1cc48e2532f73321ed06edb4941ae2d727ac,2025-06-25T13:15:23.133000 +CVE-2024-51983,0,1,bedc909e90e5407358f50891163a7e24ca03f4c18588152dbac9594b3a1673cc,2025-06-25T13:15:23.377000 +CVE-2024-51984,0,1,79f0a57fd72b0a1085d635567ee10eff8a43b87ccde02a19edb61ae5475ce42e,2025-06-25T13:15:23.900000 CVE-2024-51987,0,0,de42f826ffc8f667098d9b9c812cdb24c061b4d91dd2f98cf12cb5febe98a72f,2024-11-08T19:01:03.880000 CVE-2024-51988,0,0,a45b9470dfa3fc9b3b82cb1bacb88f01f17e4e8292b3ec9c884e93e16e6b15ff,2024-11-08T19:01:25.633000 CVE-2024-51989,0,0,a62aa77319eb44e1ae15c0a171eaaf0800894194bc1d4e92f5debdb86b23946b,2024-11-08T19:01:03.880000 @@ -288392,6 +288392,7 @@ CVE-2025-25002,0,0,12f8033c4f78f1fc2a11a22d65139dde5cad0f892f0f27858d617011f4499 CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74ec9,2025-03-11T17:16:38.043000 CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000 CVE-2025-2501,0,0,b88e6d23c5ab944162eb989f85baa8515946f4b0b4bb397d5de06dbaddedba6c,2025-06-02T17:32:17.397000 +CVE-2025-25012,1,1,a51f1a1a9e75f415cdf948a6f1f68fac77a619f4250be562c8dd2ea30c64da57,2025-06-25T12:15:19.920000 CVE-2025-25013,0,0,8b0fcb6890b87ced02ed7f1e0ef615815bf6fcf1ec3fd1005c85d59a010589fb,2025-04-09T20:02:41.860000 CVE-2025-25014,0,0,647104a2327be5f1c7c985c2226368a66da33abeea590fea277f963925352e87,2025-05-07T14:13:20.483000 CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000 @@ -293696,8 +293697,8 @@ CVE-2025-34028,0,0,5921097810a177c4353bfac19f550e88ddb782dc2bdfd50f1c119b90d9521 CVE-2025-34029,0,0,fce8cf00dbe90f2e2f66f959940597018af6c7d9b991eb3c7e5416bdc6367309,2025-06-23T20:16:21.633000 CVE-2025-3403,0,0,5499ba1d1841e737df5ef1f2a2d32505df727eeda279da8a9f0ff20d660ca6b7,2025-04-08T19:15:53.387000 CVE-2025-34030,0,0,f524795d494d41af1abb43d588204e0e445079de2112dc398bcbfb7219de5267,2025-06-23T20:16:21.633000 -CVE-2025-34031,0,0,a83a89ead5008a99e70e59878287331f19ed475018e97ea254d5a6edcad82428,2025-06-24T03:15:32.860000 -CVE-2025-34032,0,0,1662c51249658a2df2b7fe7125b51d9c24492c5099a19327f9c89f372b8d7c6f,2025-06-24T03:15:32.987000 +CVE-2025-34031,0,1,a70b5aedc0e75dc07fbfcf927e0e2e646dcc463d3cc18aab8a00fbe9c96636cd,2025-06-25T13:15:25.270000 +CVE-2025-34032,0,1,54f585644bc2d51f1157260f719a9ce5b0b0b0896326102d01601023e62f0c22,2025-06-25T13:15:25.400000 CVE-2025-34033,0,0,50da276360d9ac4942dc1b6769de57a8ae85ead868e492e6b65f0fba53e99f21,2025-06-24T22:15:21.157000 CVE-2025-34034,0,0,ff7757f528c677e8f5c6a1f05e94cc315c3dfd0881d802972ab4b91369b66bf5,2025-06-24T22:15:22.230000 CVE-2025-34035,0,0,875b7d990fc0620b461d78bcd5eb0a7cc37310985a6cc30d439b019a31ebffaa,2025-06-24T14:15:28.820000 @@ -295089,8 +295090,8 @@ CVE-2025-41234,0,0,bb572dbce1b43c89d5def5eaa839991a1c2f9f88699e8591ac93b3ce7a270 CVE-2025-41235,0,0,d4d8945eb1b378e0ed66f8c1428c86eda4f61188221c7cba9d8ecf68b09b94fa,2025-05-30T16:31:03.107000 CVE-2025-4124,0,0,2116d33601d18584d8ff86788e21befdf79ee067b30d9afca370ae97d0f6cb63,2025-05-16T16:56:49.807000 CVE-2025-4125,0,0,9ce360e53c445df2b459e99f4cc1a32fbf05cb06f761d7887ca2ad1edf5cdba7,2025-05-16T16:56:47.173000 -CVE-2025-41255,1,1,a7176b6926d7ad81c1856a10ec7e9d4648d6ff0bf70ae844ffb5539292ca9ec7,2025-06-25T10:15:21.783000 -CVE-2025-41256,1,1,96d1b365160d5f02ee20cd2de8687c8c43d24a935aa12602542fcb00925da8ef,2025-06-25T10:15:22.610000 +CVE-2025-41255,0,0,a7176b6926d7ad81c1856a10ec7e9d4648d6ff0bf70ae844ffb5539292ca9ec7,2025-06-25T10:15:21.783000 +CVE-2025-41256,0,0,96d1b365160d5f02ee20cd2de8687c8c43d24a935aa12602542fcb00925da8ef,2025-06-25T10:15:22.610000 CVE-2025-4126,0,0,c504eb8f9e35e66ea3a2e9e649e0b3ff59910e9bf49695680cf85ff18119f2ac,2025-05-16T14:43:26.160000 CVE-2025-4127,0,0,440aeef33b0470c9ce2f9d93f454f227b230a85f1c418afc74834471a41511d6,2025-06-04T22:46:00.467000 CVE-2025-4128,0,0,cbfbd23f8b9189f9d5c05298486216afcf6102f02c1375e93bdcb03aa0f43ccd,2025-06-12T16:06:20.180000 @@ -295163,7 +295164,7 @@ CVE-2025-4163,0,0,90b94328ec1d78c2c92fb5347be0835a81d1ecb778d277713df60a936155c1 CVE-2025-4164,0,0,c409a415056cfc60d19356dab298bdf2afe4926171d33ff65db9098cfdafae24,2025-05-16T17:45:46.460000 CVE-2025-41645,0,0,05dc7979d552d91b524b274c74c87b4d6526958474a345200f3e130228064f47,2025-05-13T19:35:18.080000 CVE-2025-41646,0,0,67ce20c1a9865425780a6906ee39e9288bbd25b638b5a3631cb1e54cf8c9584e,2025-06-10T19:29:22.893000 -CVE-2025-41647,1,1,85d297ffa6615dcc9a411ec6a53cc73525a368c42f7bac3676b14ff4cdbd6da4,2025-06-25T10:15:22.747000 +CVE-2025-41647,0,0,85d297ffa6615dcc9a411ec6a53cc73525a368c42f7bac3676b14ff4cdbd6da4,2025-06-25T10:15:22.747000 CVE-2025-41649,0,0,612914eeae0d0b80cff3d2f6bd08d474bd30dce7e9b2b85352e6df3c8ab3fb10,2025-05-28T15:01:30.720000 CVE-2025-41650,0,0,269c0d41f251c325a207de06d644a97e57e82f1a90edffb55ef7207165df0de3,2025-05-28T15:01:30.720000 CVE-2025-41651,0,0,38a22c1448767e102d555501f2b957b582c47bcd5ef6a6193da873a6e029276c,2025-05-28T15:01:30.720000 @@ -297394,12 +297395,12 @@ CVE-2025-4846,0,0,567ea58beeefb674198c2f090a4debb893b74f8f25c0b605e548238fa1a18e CVE-2025-48461,0,0,d4cb24a0ca958cfd524c8a208e61c21b45cf30bd8935dde1980a1409ead6ce43,2025-06-24T03:15:33.613000 CVE-2025-48462,0,0,a92baa8fe34e131d9c05e73e0d06f620a35a927c149b8a5afca7f6d615e5a9f8,2025-06-24T03:15:33.753000 CVE-2025-48463,0,0,7211400d6d7dbb163df4d1008261d95ee2fec45c1732b246e55db30906f17381,2025-06-24T03:15:33.870000 -CVE-2025-48466,0,0,302b754f6f6ff88f885556cb3e15791fcb2f400c2eea512dc96e81d9b734629b,2025-06-24T03:15:34.013000 +CVE-2025-48466,0,1,2563b76b52fd1deb9f15d3145719989c77aa827ae95f94628fb0760eb7e72663,2025-06-25T13:15:26.133000 CVE-2025-48467,0,0,65ada2888e88fb5c0497eb399176437531d80946e5f7d88848de64f9fa9754e8,2025-06-24T03:15:34.140000 CVE-2025-48468,0,0,e3f82796a87497059e9699052564dbe55665dc97b241dd7ec175041e0dcb7a93,2025-06-24T03:15:34.267000 -CVE-2025-48469,0,0,172cdce077fd14d9ebe336da59ab28d888edcd39b6f64ba16ee3c9ab53de8c80,2025-06-24T03:15:34.390000 +CVE-2025-48469,0,1,ee7a036457144c23ccd4e0a75a29af9e7ed71f0ef4e40fa2428819e7ce1abc4e,2025-06-25T13:15:26.273000 CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000 -CVE-2025-48470,0,0,bebff4979ebac402ac5fcc2e1f497aa497fdbbae56eeb86825f3178611a020e0,2025-06-24T03:15:34.523000 +CVE-2025-48470,0,1,2838398359d02ab95654539616fa46efd3e068ee075bd3027020a0928344ce00,2025-06-25T13:15:26.410000 CVE-2025-48471,0,0,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000 CVE-2025-48472,0,0,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000 CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000 @@ -297941,7 +297942,7 @@ CVE-2025-49793,0,0,25d57e0b9df99cf6003be5aeef6975cbd58104035f2746b28b6910725b1e9 CVE-2025-49794,0,0,fb1efdcc8bcb343302868601f600bbbb7fce96a3ab5152faaf6b18dcb3cfc4a1,2025-06-17T20:50:23.507000 CVE-2025-49795,0,0,4c770467268ebf148fa0f28383caf66af5bf08e634296e0cb4c455afa6e9b153,2025-06-17T20:50:23.507000 CVE-2025-49796,0,0,c3ae5367828207e03498fac8ae67ddfb08b0af4ece3b2500316915ff59e84375,2025-06-17T20:50:23.507000 -CVE-2025-49797,1,1,8911e4990266860c5e54afa1a03e682c7ce88d8f1cefc5c19c72331d0770e16f,2025-06-25T10:15:22.910000 +CVE-2025-49797,0,0,8911e4990266860c5e54afa1a03e682c7ce88d8f1cefc5c19c72331d0770e16f,2025-06-25T10:15:22.910000 CVE-2025-4980,0,0,b34e85986066032f97fe34d8a927fed77ce8edee3293780d83eab3188141a736,2025-06-12T16:21:08.950000 CVE-2025-4981,0,0,f5c12859221db84c36da0cdc2f5b3b0d709a62c17786be42789bf52dcdf30cf8,2025-06-23T20:16:40.143000 CVE-2025-49814,0,0,cd4c594b4458e6b3d192baa2131b995abe59dca872f59a22339c83ab6246bc09,2025-06-12T03:15:25.863000 @@ -298115,8 +298116,8 @@ CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0 CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000 CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000 CVE-2025-5034,0,0,32c24ba6ccd75156344e37a326a475bfa55837c0e754ff953557111ff3de4bc2,2025-06-23T20:16:21.633000 -CVE-2025-50348,0,0,5dcc135486f0213433ed5f7b9f4c6109dd3d9fe6d3d0bdb0c3c8b785caf7d50a,2025-06-24T18:15:25.610000 -CVE-2025-50349,0,0,b49b29406173d64e5335448cb0b74a4731d700428c9c3e2789ccd64489f70a7b,2025-06-24T18:15:25.830000 +CVE-2025-50348,0,1,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000 +CVE-2025-50349,0,1,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000 CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000 CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000 CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000 @@ -298883,7 +298884,7 @@ CVE-2025-5918,0,0,86b80ccf0910833edc22c6b7530445ae3be8c3d5eb7bba766fb3c183b6d35d CVE-2025-5923,0,0,bd32fa6b95a8f310c6b07918d04b1a4cdef7f962ecfa8c2518b68d11b4b0741e,2025-06-16T12:32:18.840000 CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f629748,2025-06-12T16:06:39.330000 CVE-2025-5926,0,0,d101bf01d3fcfe0cdb9553376422f17ca8d863b6b3e856d7675080f3ca9408fd,2025-06-16T12:32:18.840000 -CVE-2025-5927,1,1,cf3c733b39e9f1a3d73cd1694eb8e5bdf0dfa3a9dc6dd79673163c714eb1c6a3,2025-06-25T10:15:23.090000 +CVE-2025-5927,0,0,cf3c733b39e9f1a3d73cd1694eb8e5bdf0dfa3a9dc6dd79673163c714eb1c6a3,2025-06-25T10:15:23.090000 CVE-2025-5928,0,0,bf8e560b30d16961d3816817e86769462398f4dfd1c11ce3fc0a5a6f046bebeb,2025-06-16T12:32:18.840000 CVE-2025-5930,0,0,f247db24f36bcbf2f7d81e18a82d068f64b444dc019b1b0b868d92f5ff3fa36b,2025-06-16T12:32:18.840000 CVE-2025-5934,0,0,2b04aea49be1b2e817d664c8d52ff126b146b95757a60bd9875f5715a4755cac,2025-06-20T13:11:11.560000 @@ -299173,16 +299174,16 @@ CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287 CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000 CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000 CVE-2025-6422,0,0,106ef9916b04166cc5945f1203191244e9fd131bda586696c6c5fbd69a1a1382,2025-06-23T20:16:21.633000 -CVE-2025-6424,0,0,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000 +CVE-2025-6424,0,1,704a069dc96dca71fe354883645bea382ab0c9fd3bb7414fe9bdeeaec02801fa,2025-06-25T13:15:26.633000 CVE-2025-6425,0,0,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000 CVE-2025-6426,0,0,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000 CVE-2025-6427,0,0,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000 CVE-2025-6428,0,0,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000 CVE-2025-6429,0,0,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000 CVE-2025-6430,0,0,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000 -CVE-2025-6431,0,0,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000 +CVE-2025-6431,0,1,044ca2b501402907169f7fbba7ce2037be8fa78a7475c1b0366114cbb1ccd1a8,2025-06-25T13:15:26.800000 CVE-2025-6432,0,0,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000 -CVE-2025-6433,0,0,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000 +CVE-2025-6433,0,1,388a9e3c4ce770334337fb5b365eb81eea0a09dd37d26b543d992df75886bad1,2025-06-25T13:15:26.977000 CVE-2025-6434,0,0,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000 CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000 CVE-2025-6436,0,0,b853ac3673b78035fe770c3a17866c9ee7f8480961c5c6348e20fee513806904,2025-06-24T19:15:24.063000 @@ -299251,9 +299252,10 @@ CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328 CVE-2025-6531,0,0,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a9940,2025-06-24T00:15:25.917000 CVE-2025-6532,0,0,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000 CVE-2025-6533,0,0,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000 -CVE-2025-6534,0,0,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000 +CVE-2025-6534,0,1,4aaa4dbea2d1e21bce858b4566e1e92b835724c6fd1a3385ad07ba3ba2aacaa6,2025-06-25T13:15:27.137000 CVE-2025-6535,0,0,e42f1a6543dbf0ee5c229c993281b53636fa2406c8182d5b8ffaa7f8f3686b13,2025-06-24T14:15:31.237000 CVE-2025-6536,0,0,d013adec60ee7bce984765f553f00621206bf7b36426e84a34c5c79dd02e790d,2025-06-24T02:15:22.967000 +CVE-2025-6543,1,1,9aaa2725da776ce785d24f0dd5eecc89432fc6f7cf3f4439ec7f3a38a63ef19f,2025-06-25T13:15:27.293000 CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000 CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000 CVE-2025-6551,0,0,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000 @@ -299275,5 +299277,6 @@ CVE-2025-6580,0,0,313407b4cee1635580ede523b24ed2b3dcbbc329fd4419df576cddce24dcb0 CVE-2025-6581,0,0,75623302546846f37527192251955bf6abcfbc1a9ea07c9cd358376605100cb3,2025-06-24T23:15:21.087000 CVE-2025-6582,0,0,07de1b4aeb0f61802c9e0cc74625b01ba79e53908e01fff010b8340554ca8af3,2025-06-25T00:15:21.573000 CVE-2025-6583,0,0,977de4c8030c0fb1eb7d105ab776e053eb3c692f9cd94c3095f7ae1f288cef79,2025-06-25T00:15:22.763000 -CVE-2025-6603,1,1,d0492af04a91c27b19f0489a0c33921a6410468e308ce186bd03faaf3f47413c,2025-06-25T11:15:22.193000 -CVE-2025-6613,1,1,8ae1b51e5fef4c67b5addca2893725bb67eb764eebc7fc2637e2d1a1b4322c09,2025-06-25T10:15:23.253000 +CVE-2025-6603,0,0,d0492af04a91c27b19f0489a0c33921a6410468e308ce186bd03faaf3f47413c,2025-06-25T11:15:22.193000 +CVE-2025-6604,1,1,f499dbf33dd1db8cd9c7fdeee7df0239f800474c71a3bca629b9e334d1b6acd4,2025-06-25T13:15:27.557000 +CVE-2025-6613,0,0,8ae1b51e5fef4c67b5addca2893725bb67eb764eebc7fc2637e2d1a1b4322c09,2025-06-25T10:15:23.253000