From 7e6caefb5eb38d3a3d773a04059c17bb763dcd06 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 16 Jun 2025 06:04:00 +0000 Subject: [PATCH] Auto-Update: 2025-06-16T06:00:20.429691+00:00 --- CVE-2025/CVE-2025-61xx/CVE-2025-6104.json | 141 +++++++++++++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6105.json | 141 +++++++++++++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6106.json | 141 +++++++++++++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6107.json | 145 ++++++++++++++++++++++ README.md | 14 +-- _state.csv | 12 +- 6 files changed, 583 insertions(+), 11 deletions(-) create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6104.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6105.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6106.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6107.json diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6104.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6104.json new file mode 100644 index 00000000000..775f3a4261c --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6104.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6104", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T04:15:19.227", + "lastModified": "2025-06-16T04:15:19.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Wifi-soft UniBox Controller up to 20250506. This affects an unknown part of the file /billing/pms_check.php. The manipulation of the argument ipaddress leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2025/1/Command%20Injection%20Vulnerability%20in%20Wifi-soft%20UniBox%20controller-billing-pms_check.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312573", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312573", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590747", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6105.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6105.json new file mode 100644 index 00000000000..5665c7b83f1 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6105.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6105", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T05:15:26.567", + "lastModified": "2025-06-16T05:15:26.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in jflyfox jfinal_cms 5.0.1 and classified as problematic. This vulnerability affects unknown code of the file HOME.java. The manipulation of the argument Logout leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/webzzaa/CVE-/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312574", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312574", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590704", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6106.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6106.json new file mode 100644 index 00000000000..9f76f4dc35c --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6106.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6106", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T05:15:26.920", + "lastModified": "2025-06-16T05:15:26.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in WuKongOpenSource WukongCRM 9.0 and classified as problematic. This issue affects some unknown processing of the file AdminRoleController.java. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/luokuang1/CVE/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312575", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312575", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590852", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6107.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6107.json new file mode 100644 index 00000000000..4710b3eb6f4 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6107.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6107", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-16T05:15:27.160", + "lastModified": "2025-06-16T05:15:27.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in comfyanonymous comfyui 0.3.40. It has been classified as problematic. Affected is the function set_attr of the file /comfy/utils.py. The manipulation leads to dynamically-determined object attributes. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 2.6, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-913" + }, + { + "lang": "en", + "value": "CWE-915" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/superboy-zjc/f71b84ed074260a5e459581caa2f1fb2", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/superboy-zjc/f71b84ed074260a5e459581caa2f1fb2#proof-of-concept", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312576", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312576", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.590921", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 2bcb28b9dec..727f625fc2e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-16T04:00:21.239064+00:00 +2025-06-16T06:00:20.429691+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-16T03:15:42.283000+00:00 +2025-06-16T05:15:27.160000+00:00 ``` ### Last Data Feed Release @@ -33,17 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297976 +297980 ``` ### CVEs added in the last Commit Recently added CVEs: `4` -- [CVE-2025-6100](CVE-2025/CVE-2025-61xx/CVE-2025-6100.json) (`2025-06-16T02:15:17.870`) -- [CVE-2025-6101](CVE-2025/CVE-2025-61xx/CVE-2025-6101.json) (`2025-06-16T03:15:41.920`) -- [CVE-2025-6102](CVE-2025/CVE-2025-61xx/CVE-2025-6102.json) (`2025-06-16T03:15:42.100`) -- [CVE-2025-6103](CVE-2025/CVE-2025-61xx/CVE-2025-6103.json) (`2025-06-16T03:15:42.283`) +- [CVE-2025-6104](CVE-2025/CVE-2025-61xx/CVE-2025-6104.json) (`2025-06-16T04:15:19.227`) +- [CVE-2025-6105](CVE-2025/CVE-2025-61xx/CVE-2025-6105.json) (`2025-06-16T05:15:26.567`) +- [CVE-2025-6106](CVE-2025/CVE-2025-61xx/CVE-2025-6106.json) (`2025-06-16T05:15:26.920`) +- [CVE-2025-6107](CVE-2025/CVE-2025-61xx/CVE-2025-6107.json) (`2025-06-16T05:15:27.160`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 5d3db812f87..0bbeef91ad2 100644 --- a/_state.csv +++ b/_state.csv @@ -297971,7 +297971,11 @@ CVE-2025-6096,0,0,42d2c7eba5844242eb8728fccf194d4bcd6e98b95770097c7cb6e46f238fa9 CVE-2025-6097,0,0,067c87b7657b405f0ff8bfaf95b08f6e9d5fe3341e570a14247e14cd5563f74d,2025-06-16T00:15:18.773000 CVE-2025-6098,0,0,a530b5e2eff17d9a6bcbd1d23679a3eb495e8d45654c58fb78b8f6dc6f3543f8,2025-06-16T01:15:18.140000 CVE-2025-6099,0,0,e3b77fb4e8905e5a1876725a91f1613c349cb1e434e78e0c83324e11fbea8457,2025-06-16T01:15:18.350000 -CVE-2025-6100,1,1,35273f53917af049af7f64adc9ee7e839a44b48acd88ecfc63ec2fc8eeb99eae,2025-06-16T02:15:17.870000 -CVE-2025-6101,1,1,9eaa9ab84742e56dde9a9e204aeae4c61fb44e8a5f3c86a638705558adf0d1e4,2025-06-16T03:15:41.920000 -CVE-2025-6102,1,1,4051ec429dd7088aa840f1129fdc102f2688dd5c21c5e824822b389d9952a332,2025-06-16T03:15:42.100000 -CVE-2025-6103,1,1,8c096d0c8315c83a1ea31a474507cceb33eefeadabc588e52a20776948d93b2b,2025-06-16T03:15:42.283000 +CVE-2025-6100,0,0,35273f53917af049af7f64adc9ee7e839a44b48acd88ecfc63ec2fc8eeb99eae,2025-06-16T02:15:17.870000 +CVE-2025-6101,0,0,9eaa9ab84742e56dde9a9e204aeae4c61fb44e8a5f3c86a638705558adf0d1e4,2025-06-16T03:15:41.920000 +CVE-2025-6102,0,0,4051ec429dd7088aa840f1129fdc102f2688dd5c21c5e824822b389d9952a332,2025-06-16T03:15:42.100000 +CVE-2025-6103,0,0,8c096d0c8315c83a1ea31a474507cceb33eefeadabc588e52a20776948d93b2b,2025-06-16T03:15:42.283000 +CVE-2025-6104,1,1,0cb7244bf5516eff0aeb918019c1c01c252e2c8f9668748e11e4f5949a28ce1b,2025-06-16T04:15:19.227000 +CVE-2025-6105,1,1,95455d7ad96d623493f9a04af561f7163ab23de7bcc3da8e2d0c194f7ccdffe7,2025-06-16T05:15:26.567000 +CVE-2025-6106,1,1,f589e4d7b42d39ac74b1bc16b1d178d36ca8a28013e2d2cd9d2d4c7dbe82b409,2025-06-16T05:15:26.920000 +CVE-2025-6107,1,1,8b1b32c2f9a6580d0fc229f7e78ec0090e13aa7e7b3db84c16c06e8dd928ca71,2025-06-16T05:15:27.160000