mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-06-25T14:00:27.481340+00:00
This commit is contained in:
parent
2843575539
commit
7d7e8367f6
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47030",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T20:15:27.740",
|
||||
"lastModified": "2025-06-24T18:15:23.003",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-25T12:50:37.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1ujUcB8XEs78WwWzs8cmD-u1Twqi10yEh/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47030/CVE-2023-47030.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47031",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T17:15:27.313",
|
||||
"lastModified": "2025-06-24T18:15:23.563",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-25T13:13:50.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ncr.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://terminal.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1f9riw_seicV9MB7pRQJFY-8voxkW8ZYH/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47032",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T16:15:23.920",
|
||||
"lastModified": "2025-06-24T18:15:23.730",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-25T13:32:01.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1rTKc2nxEc40VTItJiJ9moZ5VrHG3xQuj/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47032/CVE-2023-47032.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47295",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T16:15:24.623",
|
||||
"lastModified": "2025-06-24T18:15:23.893",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-25T13:30:08.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C686A54F-A590-4FA1-AAE0-AA9D0682CD09"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/14uldfUpLRIc-NfHiUco0ja-ZiF0MazGA/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47295/CVE-2023-47295.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51978",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-06-25T08:15:31.223",
|
||||
"lastModified": "2025-06-25T08:15:31.223",
|
||||
"lastModified": "2025-06-25T13:15:20.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -71,6 +71,10 @@
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
|
||||
"source": "cve@rapid7.com"
|
||||
},
|
||||
{
|
||||
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51979",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-06-25T08:15:31.590",
|
||||
"lastModified": "2025-06-25T08:15:31.590",
|
||||
"lastModified": "2025-06-25T13:15:21.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -71,6 +71,10 @@
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
|
||||
"source": "cve@rapid7.com"
|
||||
},
|
||||
{
|
||||
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51980",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-06-25T08:15:31.930",
|
||||
"lastModified": "2025-06-25T08:15:31.930",
|
||||
"lastModified": "2025-06-25T13:15:22.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -71,6 +71,10 @@
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
|
||||
"source": "cve@rapid7.com"
|
||||
},
|
||||
{
|
||||
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51981",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-06-25T08:15:32.293",
|
||||
"lastModified": "2025-06-25T08:15:32.293",
|
||||
"lastModified": "2025-06-25T13:15:22.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,10 @@
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
|
||||
"source": "cve@rapid7.com"
|
||||
},
|
||||
{
|
||||
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51982",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-06-25T08:15:32.650",
|
||||
"lastModified": "2025-06-25T08:15:32.650",
|
||||
"lastModified": "2025-06-25T13:15:23.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -63,6 +63,10 @@
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
|
||||
"source": "cve@rapid7.com"
|
||||
},
|
||||
{
|
||||
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51983",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-06-25T08:15:32.873",
|
||||
"lastModified": "2025-06-25T08:15:32.873",
|
||||
"lastModified": "2025-06-25T13:15:23.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,6 +67,10 @@
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
|
||||
"source": "cve@rapid7.com"
|
||||
},
|
||||
{
|
||||
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51984",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-06-25T08:15:33.220",
|
||||
"lastModified": "2025-06-25T08:15:33.220",
|
||||
"lastModified": "2025-06-25T13:15:23.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -71,6 +71,10 @@
|
||||
{
|
||||
"url": "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed",
|
||||
"source": "cve@rapid7.com"
|
||||
},
|
||||
{
|
||||
"url": "https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-250xx/CVE-2025-25012.json
Normal file
56
CVE-2025/CVE-2025-250xx/CVE-2025-25012.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-25012",
|
||||
"sourceIdentifier": "bressers@elastic.co",
|
||||
"published": "2025-06-25T12:15:19.920",
|
||||
"lastModified": "2025-06-25T12:15:19.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "URL redirection to an untrusted site ('Open Redirect') in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "bressers@elastic.co",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "bressers@elastic.co",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.elastic.co/t/kibana-7-17-29-8-17-8-8-18-3-9-0-3-security-update-esa-2025-10/379444",
|
||||
"source": "bressers@elastic.co"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-34031",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:23.340",
|
||||
"lastModified": "2025-06-24T03:15:32.860",
|
||||
"lastModified": "2025-06-25T13:15:25.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de path traversal en el complemento Moodle LMS Jmol versi\u00f3n 6.1 y anteriores mediante el par\u00e1metro de consulta en jsmol.php. El script pasa directamente la entrada del usuario a la funci\u00f3n file_get_contents() sin la validaci\u00f3n adecuada, lo que permite a los atacantes leer archivos arbitrarios del sistema de archivos del servidor mediante la manipulaci\u00f3n de un valor de consulta malicioso. Esta vulnerabilidad puede explotarse sin autenticaci\u00f3n y puede exponer datos de configuraci\u00f3n confidenciales, incluidas las credenciales de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -89,6 +93,10 @@
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/46881",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/46881",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-34032",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:24.350",
|
||||
"lastModified": "2025-06-24T03:15:32.987",
|
||||
"lastModified": "2025-06-25T13:15:25.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de cross-site scripting (XSS) reflejado en el complemento Moodle LMS Jmol versi\u00f3n 6.1 y anteriores a trav\u00e9s del par\u00e1metro data en jsmol.php. La aplicaci\u00f3n no depura correctamente la entrada del usuario antes de incrustarla en la respuesta HTTP, lo que permite a un atacante ejecutar JavaScript arbitrario en el navegador de la v\u00edctima mediante la manipulaci\u00f3n de un enlace malicioso. Esto puede utilizarse para secuestrar sesiones de usuario o manipular el contenido de la p\u00e1gina."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -85,6 +89,10 @@
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/46881",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/46881",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-48466",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:34.013",
|
||||
"lastModified": "2025-06-24T03:15:34.013",
|
||||
"lastModified": "2025-06-25T13:15:26.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir que un atacante remoto no autenticado env\u00ede paquetes Modbus TCP para manipular salidas digitales, lo que potencialmente permitir\u00eda el control remoto del canal de rel\u00e9 que podr\u00eda generar riesgos operativos o de seguridad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shipcod3/CVE-2025-48466",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-48469",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:34.390",
|
||||
"lastModified": "2025-06-24T03:15:34.390",
|
||||
"lastModified": "2025-06-25T13:15:26.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload firmware through a public update page, potentially leading to backdoor installation or privilege escalation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La explotaci\u00f3n exitosa de la vulnerabilidad podr\u00eda permitir que un atacante no autenticado cargue firmware a trav\u00e9s de una p\u00e1gina de actualizaci\u00f3n p\u00fablica, lo que podr\u00eda conducir a la instalaci\u00f3n de una puerta trasera o a una escalada de privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jro.sg/CVEs/CVE-2025-48469/",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-48470",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:34.523",
|
||||
"lastModified": "2025-06-24T03:15:34.523",
|
||||
"lastModified": "2025-06-25T13:15:26.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users\u2019 browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La explotaci\u00f3n exitosa de la vulnerabilidad de cross-site scripting almacenado podr\u00eda permitir a un atacante inyectar secuencias de comandos maliciosas en los campos del dispositivo y ejecutarlas en el navegador de otros usuarios, lo que podr\u00eda conducir al secuestro de sesi\u00f3n, desfiguraci\u00f3n, robo de credenciales o escalada de privilegios. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-50348",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T19:15:24.647",
|
||||
"lastModified": "2025-06-24T18:15:25.610",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-25T13:08:13.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA2ED32-BA35-4D09-A99F-13998D3C19CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-3.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-3.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-50349",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T19:15:24.787",
|
||||
"lastModified": "2025-06-24T18:15:25.830",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-25T13:01:11.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA2ED32-BA35-4D09-A99F-13998D3C19CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-4.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-4.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-6424",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-24T13:15:23.273",
|
||||
"lastModified": "2025-06-24T13:15:23.273",
|
||||
"lastModified": "2025-06-25T13:15:26.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Use-after-free en FontFaceSet provoc\u00f3 un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox < 140, Firefox ESR < 115.25 y Firefox ESR < 128.12."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1966423",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-6431",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-24T13:15:24.103",
|
||||
"lastModified": "2025-06-24T13:15:24.103",
|
||||
"lastModified": "2025-06-25T13:15:26.800",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When a link can be opened in an external application, Firefox for Android will, by default, prompt the user before doing so. An attacker could have bypassed this prompt, potentially exposing the user to security vulnerabilities or privacy leaks in external applications. \n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 140."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cuando se puede abrir un enlace en una aplicaci\u00f3n externa, Firefox para Android, por defecto, pregunta al usuario antes de hacerlo. Un atacante podr\u00eda haber omitido esta pregunta, exponiendo al usuario a vulnerabilidades de seguridad o filtraciones de privacidad en aplicaciones externas. *Este error solo afecta a Firefox para Android. Las dem\u00e1s versiones de Firefox no se ven afectadas.* Esta vulnerabilidad afecta a Firefox anteriores a la versi\u00f3n 140."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1942716",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-6433",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-24T13:15:24.327",
|
||||
"lastModified": "2025-06-24T13:15:24.327",
|
||||
"lastModified": "2025-06-25T13:15:26.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to complete. This is in violation of the WebAuthN spec which requires \"a secure transport established without errors\". This vulnerability affects Firefox < 140."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Si un usuario visitaba una p\u00e1gina web con un certificado TLS no v\u00e1lido y conced\u00eda una excepci\u00f3n, la p\u00e1gina web pod\u00eda generar un desaf\u00edo de WebAuthN que el usuario deb\u00eda completar. Esto infringe la especificaci\u00f3n de WebAuthN, que exige \"un transporte seguro establecido sin errores\". Esta vulnerabilidad afecta a Firefox anterior a la versi\u00f3n 140."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1954033",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6534",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T01:15:25.303",
|
||||
"lastModified": "2025-06-24T01:15:25.303",
|
||||
"lastModified": "2025-06-25T13:15:27.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in xxyopen/201206030 novel-plus up to 5.1.3. This affects the function remove of the file novel-admin/src/main/java/com/java2nb/common/controller/FileController.java of the component File Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en xxyopen/201206030 novel-plus hasta la versi\u00f3n 5.1.3. Esta vulnerabilidad afecta la funci\u00f3n de eliminaci\u00f3n del archivo novel-admin/src/main/java/com/java2nb/common/controller/FileController.java del componente File Handler. La manipulaci\u00f3n conlleva un control indebido de los identificadores de recursos. Es posible iniciar el ataque de forma remota. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.596505",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-65xx/CVE-2025-6543.json
Normal file
78
CVE-2025/CVE-2025-65xx/CVE-2025-6543.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-6543",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2025-06-25T13:15:27.293",
|
||||
"lastModified": "2025-06-25T13:15:27.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when\u00a0configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "secure@citrix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.2,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@citrix.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788",
|
||||
"source": "secure@citrix.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-66xx/CVE-2025-6604.json
Normal file
145
CVE-2025/CVE-2025-66xx/CVE-2025-6604.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6604",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-25T13:15:27.557",
|
||||
"lastModified": "2025-06-25T13:15:27.557",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. This affects an unknown part of the file /panel/add-staff.php. The manipulation of the argument Name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Colorado-all/cve/blob/main/Best%20salon%20management%20system/SQL-5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313821",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313821",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.601913",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
42
README.md
42
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-25T12:00:26.161381+00:00
|
||||
2025-06-25T14:00:27.481340+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-25T11:15:22.193000+00:00
|
||||
2025-06-25T13:32:01.277000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,26 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
299278
|
||||
299281
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2025-41255](CVE-2025/CVE-2025-412xx/CVE-2025-41255.json) (`2025-06-25T10:15:21.783`)
|
||||
- [CVE-2025-41256](CVE-2025/CVE-2025-412xx/CVE-2025-41256.json) (`2025-06-25T10:15:22.610`)
|
||||
- [CVE-2025-41647](CVE-2025/CVE-2025-416xx/CVE-2025-41647.json) (`2025-06-25T10:15:22.747`)
|
||||
- [CVE-2025-49797](CVE-2025/CVE-2025-497xx/CVE-2025-49797.json) (`2025-06-25T10:15:22.910`)
|
||||
- [CVE-2025-5927](CVE-2025/CVE-2025-59xx/CVE-2025-5927.json) (`2025-06-25T10:15:23.090`)
|
||||
- [CVE-2025-6603](CVE-2025/CVE-2025-66xx/CVE-2025-6603.json) (`2025-06-25T11:15:22.193`)
|
||||
- [CVE-2025-6613](CVE-2025/CVE-2025-66xx/CVE-2025-6613.json) (`2025-06-25T10:15:23.253`)
|
||||
- [CVE-2025-25012](CVE-2025/CVE-2025-250xx/CVE-2025-25012.json) (`2025-06-25T12:15:19.920`)
|
||||
- [CVE-2025-6543](CVE-2025/CVE-2025-65xx/CVE-2025-6543.json) (`2025-06-25T13:15:27.293`)
|
||||
- [CVE-2025-6604](CVE-2025/CVE-2025-66xx/CVE-2025-6604.json) (`2025-06-25T13:15:27.557`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `22`
|
||||
|
||||
- [CVE-2023-47030](CVE-2023/CVE-2023-470xx/CVE-2023-47030.json) (`2025-06-25T12:50:37.217`)
|
||||
- [CVE-2023-47031](CVE-2023/CVE-2023-470xx/CVE-2023-47031.json) (`2025-06-25T13:13:50.157`)
|
||||
- [CVE-2023-47032](CVE-2023/CVE-2023-470xx/CVE-2023-47032.json) (`2025-06-25T13:32:01.277`)
|
||||
- [CVE-2023-47295](CVE-2023/CVE-2023-472xx/CVE-2023-47295.json) (`2025-06-25T13:30:08.523`)
|
||||
- [CVE-2024-51978](CVE-2024/CVE-2024-519xx/CVE-2024-51978.json) (`2025-06-25T13:15:20.717`)
|
||||
- [CVE-2024-51979](CVE-2024/CVE-2024-519xx/CVE-2024-51979.json) (`2025-06-25T13:15:21.790`)
|
||||
- [CVE-2024-51980](CVE-2024/CVE-2024-519xx/CVE-2024-51980.json) (`2025-06-25T13:15:22.203`)
|
||||
- [CVE-2024-51981](CVE-2024/CVE-2024-519xx/CVE-2024-51981.json) (`2025-06-25T13:15:22.677`)
|
||||
- [CVE-2024-51982](CVE-2024/CVE-2024-519xx/CVE-2024-51982.json) (`2025-06-25T13:15:23.133`)
|
||||
- [CVE-2024-51983](CVE-2024/CVE-2024-519xx/CVE-2024-51983.json) (`2025-06-25T13:15:23.377`)
|
||||
- [CVE-2024-51984](CVE-2024/CVE-2024-519xx/CVE-2024-51984.json) (`2025-06-25T13:15:23.900`)
|
||||
- [CVE-2025-34031](CVE-2025/CVE-2025-340xx/CVE-2025-34031.json) (`2025-06-25T13:15:25.270`)
|
||||
- [CVE-2025-34032](CVE-2025/CVE-2025-340xx/CVE-2025-34032.json) (`2025-06-25T13:15:25.400`)
|
||||
- [CVE-2025-48466](CVE-2025/CVE-2025-484xx/CVE-2025-48466.json) (`2025-06-25T13:15:26.133`)
|
||||
- [CVE-2025-48469](CVE-2025/CVE-2025-484xx/CVE-2025-48469.json) (`2025-06-25T13:15:26.273`)
|
||||
- [CVE-2025-48470](CVE-2025/CVE-2025-484xx/CVE-2025-48470.json) (`2025-06-25T13:15:26.410`)
|
||||
- [CVE-2025-50348](CVE-2025/CVE-2025-503xx/CVE-2025-50348.json) (`2025-06-25T13:08:13.867`)
|
||||
- [CVE-2025-50349](CVE-2025/CVE-2025-503xx/CVE-2025-50349.json) (`2025-06-25T13:01:11.240`)
|
||||
- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-06-25T13:15:26.633`)
|
||||
- [CVE-2025-6431](CVE-2025/CVE-2025-64xx/CVE-2025-6431.json) (`2025-06-25T13:15:26.800`)
|
||||
- [CVE-2025-6433](CVE-2025/CVE-2025-64xx/CVE-2025-6433.json) (`2025-06-25T13:15:26.977`)
|
||||
- [CVE-2025-6534](CVE-2025/CVE-2025-65xx/CVE-2025-6534.json) (`2025-06-25T13:15:27.137`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
61
_state.csv
61
_state.csv
@ -237904,9 +237904,9 @@ CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25
|
||||
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
|
||||
CVE-2023-47029,0,0,12b49b3ede09c8051f0adf031401d06f966f450320e558466627896d3b8f70e3,2025-06-23T20:16:21.633000
|
||||
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
|
||||
CVE-2023-47030,0,0,ee90a36dfc63d39b5c6737d0f0403f4137bce21157cbc095a67d4039da28da25,2025-06-24T18:15:23.003000
|
||||
CVE-2023-47031,0,0,8c355c94ea255597d7cb2c2cedcc31b6f0c5e4c2f796647a5bcdfb2cafe77d57,2025-06-24T18:15:23.563000
|
||||
CVE-2023-47032,0,0,ab1b52e064cb5253285a61f10d0988b397ce325e3f6846f306333001f10f5273,2025-06-24T18:15:23.730000
|
||||
CVE-2023-47030,0,1,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000
|
||||
CVE-2023-47031,0,1,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000
|
||||
CVE-2023-47032,0,1,bacc5086cd0fda0d398c9333a36399e96f47e02b2b92f2e92d77083955e738c6,2025-06-25T13:32:01.277000
|
||||
CVE-2023-47033,0,0,617818e306c20ade59924bf4bbac6b004808fa5a2cfbab4ec0f03a5ee1b8b8ca,2025-05-30T15:15:23.810000
|
||||
CVE-2023-47034,0,0,6a1f244f30344c3a3a74d180948a6a04b3859761d9cd9932f89f0d7068dfd697,2024-11-21T08:29:38.427000
|
||||
CVE-2023-47035,0,0,81ca6ef6853b599b11605e195d2498aff6e67a10accc5ef3988bd57869c19cef,2025-05-30T15:15:24.013000
|
||||
@ -238138,7 +238138,7 @@ CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb
|
||||
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
|
||||
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
|
||||
CVE-2023-47294,0,0,d3ea47b285562c39058a8eacb339c5fa3addec63cf1a3e5b9333a2e4450da9ee,2025-06-23T20:16:21.633000
|
||||
CVE-2023-47295,0,0,b4a5a5866365997d4b67d82b14a920f11d08b865f6fbb000c9018e6db15b352d,2025-06-24T18:15:23.893000
|
||||
CVE-2023-47295,0,1,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000
|
||||
CVE-2023-47297,0,0,8949ada58483b5ab75d0893499dc33e938392dca9ba71df8235231fd2dbaa934,2025-06-24T18:15:24.060000
|
||||
CVE-2023-47298,0,0,c409530cf61d56b21c99c649ee44169bc5e7d2ee17a3a9ef9a5831f4a402984b,2025-06-24T16:15:23.940000
|
||||
CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000
|
||||
@ -274829,14 +274829,14 @@ CVE-2024-51963,0,0,65d15561511f4792024c62d0c3dbbe1a84656f415b27a24cc7fcb099d4df1
|
||||
CVE-2024-51966,0,0,69a0d46bcaa28466534ecd74cb2be650273566964ba1c75d7e0cb22b97d45b63,2025-04-10T20:15:21.850000
|
||||
CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000
|
||||
CVE-2024-51977,0,0,6f38658394725c55998fb8fb4c547765adae4f5bfc0f1b441e5f316f5094f7df,2025-06-25T08:15:30.053000
|
||||
CVE-2024-51978,0,0,44f28670ba4aad01b2cab1e0a17e8fb3344218487bfaa21f545b2957b78b1aeb,2025-06-25T08:15:31.223000
|
||||
CVE-2024-51979,0,0,7429856c2cab5ae7d15707bbef67ec808b2f44a2637525d216353bef0260aa8b,2025-06-25T08:15:31.590000
|
||||
CVE-2024-51978,0,1,d44b0cb729e7cd696172a236e99f532d446a4a53474bf05684dfd78a11be47d6,2025-06-25T13:15:20.717000
|
||||
CVE-2024-51979,0,1,04bf702ad651656976f29cdcae61c0e3e2e9a3e657ff9b88c97cf67bf1bb262f,2025-06-25T13:15:21.790000
|
||||
CVE-2024-5198,0,0,3fa9ec394e1888d66e83812554066b455d9458d73cda1ea9275cc8bdd128d3dc,2025-06-10T16:12:09.340000
|
||||
CVE-2024-51980,0,0,b18f64f7aa3048ec39d082a8669a7bf601251b6412a7b23ebac6c2d1ee2e0ba1,2025-06-25T08:15:31.930000
|
||||
CVE-2024-51981,0,0,980109182d9945f2520d085055b44b201830eb4e90fa94fff4458383987395f6,2025-06-25T08:15:32.293000
|
||||
CVE-2024-51982,0,0,06f6a1e27a95c32cb69b28782e5d6615d8c28e7f8c2b84931342b03b5deac10e,2025-06-25T08:15:32.650000
|
||||
CVE-2024-51983,0,0,36bcfba68c3a049625884d1458380ec3cfbbad4ef01aed8743fe39304244919a,2025-06-25T08:15:32.873000
|
||||
CVE-2024-51984,0,0,31dbf56b669052fe1f240085e00dd9f82b12f4346271534902d4591059b5ddd1,2025-06-25T08:15:33.220000
|
||||
CVE-2024-51980,0,1,6d10bfcf86832faf46af355a7aa26eff84d97c03c8138abcea972409ecbc69ec,2025-06-25T13:15:22.203000
|
||||
CVE-2024-51981,0,1,72ddbd3bfa6041b937ecf18a390d4a284a967c5c635371727ce70c88313d691d,2025-06-25T13:15:22.677000
|
||||
CVE-2024-51982,0,1,27746e69663bb58bd06458c806ed1cc48e2532f73321ed06edb4941ae2d727ac,2025-06-25T13:15:23.133000
|
||||
CVE-2024-51983,0,1,bedc909e90e5407358f50891163a7e24ca03f4c18588152dbac9594b3a1673cc,2025-06-25T13:15:23.377000
|
||||
CVE-2024-51984,0,1,79f0a57fd72b0a1085d635567ee10eff8a43b87ccde02a19edb61ae5475ce42e,2025-06-25T13:15:23.900000
|
||||
CVE-2024-51987,0,0,de42f826ffc8f667098d9b9c812cdb24c061b4d91dd2f98cf12cb5febe98a72f,2024-11-08T19:01:03.880000
|
||||
CVE-2024-51988,0,0,a45b9470dfa3fc9b3b82cb1bacb88f01f17e4e8292b3ec9c884e93e16e6b15ff,2024-11-08T19:01:25.633000
|
||||
CVE-2024-51989,0,0,a62aa77319eb44e1ae15c0a171eaaf0800894194bc1d4e92f5debdb86b23946b,2024-11-08T19:01:03.880000
|
||||
@ -288392,6 +288392,7 @@ CVE-2025-25002,0,0,12f8033c4f78f1fc2a11a22d65139dde5cad0f892f0f27858d617011f4499
|
||||
CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74ec9,2025-03-11T17:16:38.043000
|
||||
CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000
|
||||
CVE-2025-2501,0,0,b88e6d23c5ab944162eb989f85baa8515946f4b0b4bb397d5de06dbaddedba6c,2025-06-02T17:32:17.397000
|
||||
CVE-2025-25012,1,1,a51f1a1a9e75f415cdf948a6f1f68fac77a619f4250be562c8dd2ea30c64da57,2025-06-25T12:15:19.920000
|
||||
CVE-2025-25013,0,0,8b0fcb6890b87ced02ed7f1e0ef615815bf6fcf1ec3fd1005c85d59a010589fb,2025-04-09T20:02:41.860000
|
||||
CVE-2025-25014,0,0,647104a2327be5f1c7c985c2226368a66da33abeea590fea277f963925352e87,2025-05-07T14:13:20.483000
|
||||
CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000
|
||||
@ -293696,8 +293697,8 @@ CVE-2025-34028,0,0,5921097810a177c4353bfac19f550e88ddb782dc2bdfd50f1c119b90d9521
|
||||
CVE-2025-34029,0,0,fce8cf00dbe90f2e2f66f959940597018af6c7d9b991eb3c7e5416bdc6367309,2025-06-23T20:16:21.633000
|
||||
CVE-2025-3403,0,0,5499ba1d1841e737df5ef1f2a2d32505df727eeda279da8a9f0ff20d660ca6b7,2025-04-08T19:15:53.387000
|
||||
CVE-2025-34030,0,0,f524795d494d41af1abb43d588204e0e445079de2112dc398bcbfb7219de5267,2025-06-23T20:16:21.633000
|
||||
CVE-2025-34031,0,0,a83a89ead5008a99e70e59878287331f19ed475018e97ea254d5a6edcad82428,2025-06-24T03:15:32.860000
|
||||
CVE-2025-34032,0,0,1662c51249658a2df2b7fe7125b51d9c24492c5099a19327f9c89f372b8d7c6f,2025-06-24T03:15:32.987000
|
||||
CVE-2025-34031,0,1,a70b5aedc0e75dc07fbfcf927e0e2e646dcc463d3cc18aab8a00fbe9c96636cd,2025-06-25T13:15:25.270000
|
||||
CVE-2025-34032,0,1,54f585644bc2d51f1157260f719a9ce5b0b0b0896326102d01601023e62f0c22,2025-06-25T13:15:25.400000
|
||||
CVE-2025-34033,0,0,50da276360d9ac4942dc1b6769de57a8ae85ead868e492e6b65f0fba53e99f21,2025-06-24T22:15:21.157000
|
||||
CVE-2025-34034,0,0,ff7757f528c677e8f5c6a1f05e94cc315c3dfd0881d802972ab4b91369b66bf5,2025-06-24T22:15:22.230000
|
||||
CVE-2025-34035,0,0,875b7d990fc0620b461d78bcd5eb0a7cc37310985a6cc30d439b019a31ebffaa,2025-06-24T14:15:28.820000
|
||||
@ -295089,8 +295090,8 @@ CVE-2025-41234,0,0,bb572dbce1b43c89d5def5eaa839991a1c2f9f88699e8591ac93b3ce7a270
|
||||
CVE-2025-41235,0,0,d4d8945eb1b378e0ed66f8c1428c86eda4f61188221c7cba9d8ecf68b09b94fa,2025-05-30T16:31:03.107000
|
||||
CVE-2025-4124,0,0,2116d33601d18584d8ff86788e21befdf79ee067b30d9afca370ae97d0f6cb63,2025-05-16T16:56:49.807000
|
||||
CVE-2025-4125,0,0,9ce360e53c445df2b459e99f4cc1a32fbf05cb06f761d7887ca2ad1edf5cdba7,2025-05-16T16:56:47.173000
|
||||
CVE-2025-41255,1,1,a7176b6926d7ad81c1856a10ec7e9d4648d6ff0bf70ae844ffb5539292ca9ec7,2025-06-25T10:15:21.783000
|
||||
CVE-2025-41256,1,1,96d1b365160d5f02ee20cd2de8687c8c43d24a935aa12602542fcb00925da8ef,2025-06-25T10:15:22.610000
|
||||
CVE-2025-41255,0,0,a7176b6926d7ad81c1856a10ec7e9d4648d6ff0bf70ae844ffb5539292ca9ec7,2025-06-25T10:15:21.783000
|
||||
CVE-2025-41256,0,0,96d1b365160d5f02ee20cd2de8687c8c43d24a935aa12602542fcb00925da8ef,2025-06-25T10:15:22.610000
|
||||
CVE-2025-4126,0,0,c504eb8f9e35e66ea3a2e9e649e0b3ff59910e9bf49695680cf85ff18119f2ac,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4127,0,0,440aeef33b0470c9ce2f9d93f454f227b230a85f1c418afc74834471a41511d6,2025-06-04T22:46:00.467000
|
||||
CVE-2025-4128,0,0,cbfbd23f8b9189f9d5c05298486216afcf6102f02c1375e93bdcb03aa0f43ccd,2025-06-12T16:06:20.180000
|
||||
@ -295163,7 +295164,7 @@ CVE-2025-4163,0,0,90b94328ec1d78c2c92fb5347be0835a81d1ecb778d277713df60a936155c1
|
||||
CVE-2025-4164,0,0,c409a415056cfc60d19356dab298bdf2afe4926171d33ff65db9098cfdafae24,2025-05-16T17:45:46.460000
|
||||
CVE-2025-41645,0,0,05dc7979d552d91b524b274c74c87b4d6526958474a345200f3e130228064f47,2025-05-13T19:35:18.080000
|
||||
CVE-2025-41646,0,0,67ce20c1a9865425780a6906ee39e9288bbd25b638b5a3631cb1e54cf8c9584e,2025-06-10T19:29:22.893000
|
||||
CVE-2025-41647,1,1,85d297ffa6615dcc9a411ec6a53cc73525a368c42f7bac3676b14ff4cdbd6da4,2025-06-25T10:15:22.747000
|
||||
CVE-2025-41647,0,0,85d297ffa6615dcc9a411ec6a53cc73525a368c42f7bac3676b14ff4cdbd6da4,2025-06-25T10:15:22.747000
|
||||
CVE-2025-41649,0,0,612914eeae0d0b80cff3d2f6bd08d474bd30dce7e9b2b85352e6df3c8ab3fb10,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41650,0,0,269c0d41f251c325a207de06d644a97e57e82f1a90edffb55ef7207165df0de3,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41651,0,0,38a22c1448767e102d555501f2b957b582c47bcd5ef6a6193da873a6e029276c,2025-05-28T15:01:30.720000
|
||||
@ -297394,12 +297395,12 @@ CVE-2025-4846,0,0,567ea58beeefb674198c2f090a4debb893b74f8f25c0b605e548238fa1a18e
|
||||
CVE-2025-48461,0,0,d4cb24a0ca958cfd524c8a208e61c21b45cf30bd8935dde1980a1409ead6ce43,2025-06-24T03:15:33.613000
|
||||
CVE-2025-48462,0,0,a92baa8fe34e131d9c05e73e0d06f620a35a927c149b8a5afca7f6d615e5a9f8,2025-06-24T03:15:33.753000
|
||||
CVE-2025-48463,0,0,7211400d6d7dbb163df4d1008261d95ee2fec45c1732b246e55db30906f17381,2025-06-24T03:15:33.870000
|
||||
CVE-2025-48466,0,0,302b754f6f6ff88f885556cb3e15791fcb2f400c2eea512dc96e81d9b734629b,2025-06-24T03:15:34.013000
|
||||
CVE-2025-48466,0,1,2563b76b52fd1deb9f15d3145719989c77aa827ae95f94628fb0760eb7e72663,2025-06-25T13:15:26.133000
|
||||
CVE-2025-48467,0,0,65ada2888e88fb5c0497eb399176437531d80946e5f7d88848de64f9fa9754e8,2025-06-24T03:15:34.140000
|
||||
CVE-2025-48468,0,0,e3f82796a87497059e9699052564dbe55665dc97b241dd7ec175041e0dcb7a93,2025-06-24T03:15:34.267000
|
||||
CVE-2025-48469,0,0,172cdce077fd14d9ebe336da59ab28d888edcd39b6f64ba16ee3c9ab53de8c80,2025-06-24T03:15:34.390000
|
||||
CVE-2025-48469,0,1,ee7a036457144c23ccd4e0a75a29af9e7ed71f0ef4e40fa2428819e7ce1abc4e,2025-06-25T13:15:26.273000
|
||||
CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000
|
||||
CVE-2025-48470,0,0,bebff4979ebac402ac5fcc2e1f497aa497fdbbae56eeb86825f3178611a020e0,2025-06-24T03:15:34.523000
|
||||
CVE-2025-48470,0,1,2838398359d02ab95654539616fa46efd3e068ee075bd3027020a0928344ce00,2025-06-25T13:15:26.410000
|
||||
CVE-2025-48471,0,0,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000
|
||||
CVE-2025-48472,0,0,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000
|
||||
CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000
|
||||
@ -297941,7 +297942,7 @@ CVE-2025-49793,0,0,25d57e0b9df99cf6003be5aeef6975cbd58104035f2746b28b6910725b1e9
|
||||
CVE-2025-49794,0,0,fb1efdcc8bcb343302868601f600bbbb7fce96a3ab5152faaf6b18dcb3cfc4a1,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49795,0,0,4c770467268ebf148fa0f28383caf66af5bf08e634296e0cb4c455afa6e9b153,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49796,0,0,c3ae5367828207e03498fac8ae67ddfb08b0af4ece3b2500316915ff59e84375,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49797,1,1,8911e4990266860c5e54afa1a03e682c7ce88d8f1cefc5c19c72331d0770e16f,2025-06-25T10:15:22.910000
|
||||
CVE-2025-49797,0,0,8911e4990266860c5e54afa1a03e682c7ce88d8f1cefc5c19c72331d0770e16f,2025-06-25T10:15:22.910000
|
||||
CVE-2025-4980,0,0,b34e85986066032f97fe34d8a927fed77ce8edee3293780d83eab3188141a736,2025-06-12T16:21:08.950000
|
||||
CVE-2025-4981,0,0,f5c12859221db84c36da0cdc2f5b3b0d709a62c17786be42789bf52dcdf30cf8,2025-06-23T20:16:40.143000
|
||||
CVE-2025-49814,0,0,cd4c594b4458e6b3d192baa2131b995abe59dca872f59a22339c83ab6246bc09,2025-06-12T03:15:25.863000
|
||||
@ -298115,8 +298116,8 @@ CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0
|
||||
CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced0f,2025-05-28T14:12:07.037000
|
||||
CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000
|
||||
CVE-2025-5034,0,0,32c24ba6ccd75156344e37a326a475bfa55837c0e754ff953557111ff3de4bc2,2025-06-23T20:16:21.633000
|
||||
CVE-2025-50348,0,0,5dcc135486f0213433ed5f7b9f4c6109dd3d9fe6d3d0bdb0c3c8b785caf7d50a,2025-06-24T18:15:25.610000
|
||||
CVE-2025-50349,0,0,b49b29406173d64e5335448cb0b74a4731d700428c9c3e2789ccd64489f70a7b,2025-06-24T18:15:25.830000
|
||||
CVE-2025-50348,0,1,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000
|
||||
CVE-2025-50349,0,1,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000
|
||||
CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000
|
||||
CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
|
||||
CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
|
||||
@ -298883,7 +298884,7 @@ CVE-2025-5918,0,0,86b80ccf0910833edc22c6b7530445ae3be8c3d5eb7bba766fb3c183b6d35d
|
||||
CVE-2025-5923,0,0,bd32fa6b95a8f310c6b07918d04b1a4cdef7f962ecfa8c2518b68d11b4b0741e,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f629748,2025-06-12T16:06:39.330000
|
||||
CVE-2025-5926,0,0,d101bf01d3fcfe0cdb9553376422f17ca8d863b6b3e856d7675080f3ca9408fd,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5927,1,1,cf3c733b39e9f1a3d73cd1694eb8e5bdf0dfa3a9dc6dd79673163c714eb1c6a3,2025-06-25T10:15:23.090000
|
||||
CVE-2025-5927,0,0,cf3c733b39e9f1a3d73cd1694eb8e5bdf0dfa3a9dc6dd79673163c714eb1c6a3,2025-06-25T10:15:23.090000
|
||||
CVE-2025-5928,0,0,bf8e560b30d16961d3816817e86769462398f4dfd1c11ce3fc0a5a6f046bebeb,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5930,0,0,f247db24f36bcbf2f7d81e18a82d068f64b444dc019b1b0b868d92f5ff3fa36b,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5934,0,0,2b04aea49be1b2e817d664c8d52ff126b146b95757a60bd9875f5715a4755cac,2025-06-20T13:11:11.560000
|
||||
@ -299173,16 +299174,16 @@ CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287
|
||||
CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6422,0,0,106ef9916b04166cc5945f1203191244e9fd131bda586696c6c5fbd69a1a1382,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6424,0,0,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000
|
||||
CVE-2025-6424,0,1,704a069dc96dca71fe354883645bea382ab0c9fd3bb7414fe9bdeeaec02801fa,2025-06-25T13:15:26.633000
|
||||
CVE-2025-6425,0,0,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000
|
||||
CVE-2025-6426,0,0,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000
|
||||
CVE-2025-6427,0,0,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000
|
||||
CVE-2025-6428,0,0,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000
|
||||
CVE-2025-6429,0,0,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000
|
||||
CVE-2025-6430,0,0,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000
|
||||
CVE-2025-6431,0,0,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000
|
||||
CVE-2025-6431,0,1,044ca2b501402907169f7fbba7ce2037be8fa78a7475c1b0366114cbb1ccd1a8,2025-06-25T13:15:26.800000
|
||||
CVE-2025-6432,0,0,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000
|
||||
CVE-2025-6433,0,0,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000
|
||||
CVE-2025-6433,0,1,388a9e3c4ce770334337fb5b365eb81eea0a09dd37d26b543d992df75886bad1,2025-06-25T13:15:26.977000
|
||||
CVE-2025-6434,0,0,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000
|
||||
CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
|
||||
CVE-2025-6436,0,0,b853ac3673b78035fe770c3a17866c9ee7f8480961c5c6348e20fee513806904,2025-06-24T19:15:24.063000
|
||||
@ -299251,9 +299252,10 @@ CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328
|
||||
CVE-2025-6531,0,0,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a9940,2025-06-24T00:15:25.917000
|
||||
CVE-2025-6532,0,0,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000
|
||||
CVE-2025-6533,0,0,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000
|
||||
CVE-2025-6534,0,0,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000
|
||||
CVE-2025-6534,0,1,4aaa4dbea2d1e21bce858b4566e1e92b835724c6fd1a3385ad07ba3ba2aacaa6,2025-06-25T13:15:27.137000
|
||||
CVE-2025-6535,0,0,e42f1a6543dbf0ee5c229c993281b53636fa2406c8182d5b8ffaa7f8f3686b13,2025-06-24T14:15:31.237000
|
||||
CVE-2025-6536,0,0,d013adec60ee7bce984765f553f00621206bf7b36426e84a34c5c79dd02e790d,2025-06-24T02:15:22.967000
|
||||
CVE-2025-6543,1,1,9aaa2725da776ce785d24f0dd5eecc89432fc6f7cf3f4439ec7f3a38a63ef19f,2025-06-25T13:15:27.293000
|
||||
CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6551,0,0,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000
|
||||
@ -299275,5 +299277,6 @@ CVE-2025-6580,0,0,313407b4cee1635580ede523b24ed2b3dcbbc329fd4419df576cddce24dcb0
|
||||
CVE-2025-6581,0,0,75623302546846f37527192251955bf6abcfbc1a9ea07c9cd358376605100cb3,2025-06-24T23:15:21.087000
|
||||
CVE-2025-6582,0,0,07de1b4aeb0f61802c9e0cc74625b01ba79e53908e01fff010b8340554ca8af3,2025-06-25T00:15:21.573000
|
||||
CVE-2025-6583,0,0,977de4c8030c0fb1eb7d105ab776e053eb3c692f9cd94c3095f7ae1f288cef79,2025-06-25T00:15:22.763000
|
||||
CVE-2025-6603,1,1,d0492af04a91c27b19f0489a0c33921a6410468e308ce186bd03faaf3f47413c,2025-06-25T11:15:22.193000
|
||||
CVE-2025-6613,1,1,8ae1b51e5fef4c67b5addca2893725bb67eb764eebc7fc2637e2d1a1b4322c09,2025-06-25T10:15:23.253000
|
||||
CVE-2025-6603,0,0,d0492af04a91c27b19f0489a0c33921a6410468e308ce186bd03faaf3f47413c,2025-06-25T11:15:22.193000
|
||||
CVE-2025-6604,1,1,f499dbf33dd1db8cd9c7fdeee7df0239f800474c71a3bca629b9e334d1b6acd4,2025-06-25T13:15:27.557000
|
||||
CVE-2025-6613,0,0,8ae1b51e5fef4c67b5addca2893725bb67eb764eebc7fc2637e2d1a1b4322c09,2025-06-25T10:15:23.253000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user