From 8913de98147c8590f0d2a0eccd8fd025650df031 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 2 Jun 2025 14:03:56 +0000 Subject: [PATCH] Auto-Update: 2025-06-02T14:00:19.743193+00:00 --- CVE-2024/CVE-2024-121xx/CVE-2024-12168.json | 78 +++++++++++ CVE-2024/CVE-2024-264xx/CVE-2024-26467.json | 32 ++++- CVE-2024/CVE-2024-264xx/CVE-2024-26468.json | 32 ++++- CVE-2024/CVE-2024-282xx/CVE-2024-28286.json | 35 ++++- CVE-2025/CVE-2025-263xx/CVE-2025-26396.json | 60 ++++++++ CVE-2025/CVE-2025-468xx/CVE-2025-46806.json | 82 +++++++++++ CVE-2025/CVE-2025-468xx/CVE-2025-46807.json | 82 +++++++++++ CVE-2025/CVE-2025-472xx/CVE-2025-47289.json | 8 +- CVE-2025/CVE-2025-484xx/CVE-2025-48495.json | 86 ++++++++++++ CVE-2025/CVE-2025-487xx/CVE-2025-48745.json | 16 +++ CVE-2025/CVE-2025-489xx/CVE-2025-48955.json | 60 ++++++++ CVE-2025/CVE-2025-489xx/CVE-2025-48957.json | 68 +++++++++ CVE-2025/CVE-2025-489xx/CVE-2025-48958.json | 64 +++++++++ CVE-2025/CVE-2025-489xx/CVE-2025-48990.json | 82 +++++++++++ CVE-2025/CVE-2025-491xx/CVE-2025-49113.json | 8 +- CVE-2025/CVE-2025-54xx/CVE-2025-5428.json | 10 +- CVE-2025/CVE-2025-54xx/CVE-2025-5430.json | 10 +- CVE-2025/CVE-2025-54xx/CVE-2025-5431.json | 10 +- CVE-2025/CVE-2025-54xx/CVE-2025-5432.json | 10 +- CVE-2025/CVE-2025-54xx/CVE-2025-5443.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-54xx/CVE-2025-5444.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-54xx/CVE-2025-5445.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-54xx/CVE-2025-5446.json | 145 ++++++++++++++++++++ README.md | 46 ++++--- _state.csv | 60 ++++---- 25 files changed, 1449 insertions(+), 70 deletions(-) create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12168.json create mode 100644 CVE-2025/CVE-2025-263xx/CVE-2025-26396.json create mode 100644 CVE-2025/CVE-2025-468xx/CVE-2025-46806.json create mode 100644 CVE-2025/CVE-2025-468xx/CVE-2025-46807.json create mode 100644 CVE-2025/CVE-2025-484xx/CVE-2025-48495.json create mode 100644 CVE-2025/CVE-2025-487xx/CVE-2025-48745.json create mode 100644 CVE-2025/CVE-2025-489xx/CVE-2025-48955.json create mode 100644 CVE-2025/CVE-2025-489xx/CVE-2025-48957.json create mode 100644 CVE-2025/CVE-2025-489xx/CVE-2025-48958.json create mode 100644 CVE-2025/CVE-2025-489xx/CVE-2025-48990.json create mode 100644 CVE-2025/CVE-2025-54xx/CVE-2025-5443.json create mode 100644 CVE-2025/CVE-2025-54xx/CVE-2025-5444.json create mode 100644 CVE-2025/CVE-2025-54xx/CVE-2025-5445.json create mode 100644 CVE-2025/CVE-2025-54xx/CVE-2025-5446.json diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12168.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12168.json new file mode 100644 index 00000000000..84af8833063 --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12168.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-12168", + "sourceIdentifier": "browser-security@yandex-team.ru", + "published": "2025-06-02T13:15:20.517", + "lastModified": "2025-06-02T13:15:20.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Yandex Telemost for Desktop before 2.7.0\u00a0has a DLL Hijacking Vulnerability because an untrusted search path is used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "browser-security@yandex-team.ru", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "browser-security@yandex-team.ru", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://yandex.com/bugbounty/i/hall-of-fame-products", + "source": "browser-security@yandex-team.ru" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json index 2042d90dbd9..2082ee4c5bd 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26467", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:59.823", - "lastModified": "2024-11-21T09:02:27.513", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-02T13:46:43.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tabatkins:railroad-diagram_generator:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-01-15", + "matchCriteriaId": "64C9CFD5-202A-4156-96F0-86249C61C605" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/cd80/50463b0e62067ec861b7006cbf46b068", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/cd80/50463b0e62067ec861b7006cbf46b068", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26468.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26468.json index eb148e1d151..ecef4f8d0f3 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26468.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26468", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:59.870", - "lastModified": "2024-11-21T09:02:27.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-02T13:55:25.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jstrieb:url_pages:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2020-10-25", + "matchCriteriaId": "9C2C99DD-FE4F-420C-8E81-F6ED755A634C" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/cd80/87b41cf58ba04564d55f4a26152bf0a9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/cd80/87b41cf58ba04564d55f4a26152bf0a9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28286.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28286.json index 9b28917e723..fe1b3ceb650 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28286.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28286", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:24.617", - "lastModified": "2024-11-21T09:06:08.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-02T13:59:05.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mz-automation:libiec61850:1.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6F82EDC5-C42C-4EED-A04D-D27F75F61D21" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mz-automation/libiec61850/issues/496", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/mz-automation/libiec61850/issues/496", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26396.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26396.json new file mode 100644 index 00000000000..236462a358c --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26396.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26396", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2025-06-02T13:15:21.367", + "lastModified": "2025-06-02T13:15:21.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SolarWinds Dameware Mini Remote Control was determined to be affected by Incorrect Permissions Local Privilege Escalation Vulnerability. This vulnerability requires local access and a valid low privilege account to be susceptible to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.solarwinds.com/en/success_center/dameware/content/release_notes/dameware_12-3-2_release_notes.htm", + "source": "psirt@solarwinds.com" + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26396", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-468xx/CVE-2025-46806.json b/CVE-2025/CVE-2025-468xx/CVE-2025-46806.json new file mode 100644 index 00000000000..8f72cc45887 --- /dev/null +++ b/CVE-2025/CVE-2025-468xx/CVE-2025-46806.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-46806", + "sourceIdentifier": "meissner@suse.de", + "published": "2025-06-02T13:15:21.600", + "lastModified": "2025-06-02T13:15:21.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Use of Out-of-range Pointer Offset vulnerability in sslh leads to denial of service on some architectures.This issue affects sslh before 2.2.4." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-823" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46806", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/yrutschle/sslh/releases/tag/v2.2.4", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-468xx/CVE-2025-46807.json b/CVE-2025/CVE-2025-468xx/CVE-2025-46807.json new file mode 100644 index 00000000000..367eea6fff9 --- /dev/null +++ b/CVE-2025/CVE-2025-468xx/CVE-2025-46807.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-46807", + "sourceIdentifier": "meissner@suse.de", + "published": "2025-06-02T12:15:24.800", + "lastModified": "2025-06-02T12:15:24.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Allocation of Resources Without Limits or Throttling vulnerability in sslh allows attackers to easily exhaust the file descriptors in sslh and deny legitimate users service.This issue affects sslh before 2.2.4." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46807", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/yrutschle/sslh/releases/tag/v2.2.4", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json b/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json index 33a87a51b02..2aae1f0012b 100644 --- a/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json +++ b/CVE-2025/CVE-2025-472xx/CVE-2025-47289.json @@ -2,7 +2,7 @@ "id": "CVE-2025-47289", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-02T11:15:22.710", - "lastModified": "2025-06-02T11:15:22.710", + "lastModified": "2025-06-02T13:15:21.743", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48495.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48495.json new file mode 100644 index 00000000000..7737b9e6cda --- /dev/null +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48495.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-48495", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-02T12:15:25.380", + "lastModified": "2025-06-02T12:15:25.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. By renaming the friendly name of an API key, an authenticated user could inject JS into the API key overview, which would also be executed when another user clicks on his API tab. Prior to version 2.0.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users of versions prior to 2.0.0. If a user is the only authenticated user using Gokapi, they are not affected. This issue has been fixed in v2.0.0. A workaround would be to not open the API page if it is possible that another user might have injected code." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-87" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Forceu/Gokapi/commit/65ddbc68fbfdf1c80cadb477f4bcbb7f2c4fdbf8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Forceu/Gokapi/security/advisories/GHSA-4xg4-54hm-9j77", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48745.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48745.json new file mode 100644 index 00000000000..e756556cee8 --- /dev/null +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48745.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-48745", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-02T13:15:21.897", + "lastModified": "2025-06-02T13:15:21.897", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-49113. Reason: This candidate is a reservation duplicate of CVE-2025-49113. Notes: All CVE users should reference CVE-2025-49113 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48955.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48955.json new file mode 100644 index 00000000000..ddad6b98fcc --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48955.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-48955", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-02T12:15:25.523", + "lastModified": "2025-06-02T12:15:25.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 exposes both access and secret keys in logs without redaction. These credentials are later reused in variable assignments for persistence but do not require logging for debugging or system health purposes. Version 1.50.8 fixes the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Erudika/para/commit/1e8a89558542854bb0683ab234c4429ad93b0835", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Erudika/para/security/advisories/GHSA-v75g-77vf-6jjq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48957.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48957.json new file mode 100644 index 00000000000..be93fe5a2b0 --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48957.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-48957", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-02T12:15:25.680", + "lastModified": "2025-06-02T12:15:25.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a workaround, users can edit the `cmd_config.json` file to disable the dashboard feature as a temporary workaround. However, it is strongly recommended to upgrade to version v3.5.13 or later to fully resolve this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/AstrBotDevs/AstrBot/commit/cceadf222c46813c7f41115b40d371e7eb91e492", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/AstrBotDevs/AstrBot/issues/1675", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/AstrBotDevs/AstrBot/pull/1676", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/AstrBotDevs/AstrBot/security/advisories/GHSA-cq37-g2qp-3c2p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48958.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48958.json new file mode 100644 index 00000000000..098da137109 --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48958.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-48958", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-02T12:15:25.840", + "lastModified": "2025-06-02T12:15:25.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Froxlor is open source server administration software. Prior to version 2.2.6, an HTML Injection vulnerability in the customer account portal allows an attacker to inject malicious HTML payloads in the email section. This can lead to phishing attacks, credential theft, and reputational damage by redirecting users to malicious external websites. The vulnerability has a medium severity, as it can be exploited through user input without authentication. Version 2.2.6 fixes the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/froxlor/Froxlor/commit/fde43f80600f1035e1e3d2297411b666d805549a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/froxlor/Froxlor/security/advisories/GHSA-26xq-m8xw-6373", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/user-attachments/assets/86947633-3e7c-4e10-86cc-92e577761e8e", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-489xx/CVE-2025-48990.json b/CVE-2025/CVE-2025-489xx/CVE-2025-48990.json new file mode 100644 index 00000000000..f5c1f93393b --- /dev/null +++ b/CVE-2025/CVE-2025-489xx/CVE-2025-48990.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-48990", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-02T12:15:25.997", + "lastModified": "2025-06-02T12:15:25.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NeKernal is a free and open-source operating system stack. Version 0.0.2 has a 1-byte heap overflow in `rt_copy_memory`, which unconditionally wrote a null terminator at `dst[len]`. When `len` equals the size of the destination buffer (256 bytes), that extra `'\\0'` write overruns the buffer by one byte. To avoid breaking existing callers or changing the public API, the patch in commit fb7b7f658327f659c6a6da1af151cb389c2ca4ee takes a minimal approach: it simply removes the overflow-causing line without adding bounds checks or altering the function signature." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nekernel-org/nekernel/commit/fb7b7f658327f659c6a6da1af151cb389c2ca4ee", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nekernel-org/nekernel/security/advisories/GHSA-jvvh-fp57-2p32", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json index 15b0d2b842d..8f7b28dadaa 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49113.json @@ -2,7 +2,7 @@ "id": "CVE-2025-49113", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-02T05:15:53.420", - "lastModified": "2025-06-02T05:15:53.420", + "lastModified": "2025-06-02T13:15:21.987", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "cve@mitre.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -48,6 +48,10 @@ } ], "references": [ + { + "url": "https://fearsoff.org/research/roundcube", + "source": "cve@mitre.org" + }, { "url": "https://github.com/roundcube/roundcubemail/commit/0376f69e958a8fef7f6f09e352c541b4e7729c4d", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5428.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5428.json index 7f6eb8be4ff..94e9d9cfd21 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5428.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5428.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5428", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-02T04:15:44.977", - "lastModified": "2025-06-02T04:15:44.977", + "lastModified": "2025-06-02T13:15:22.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.584056", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_list_delete_logs.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5430.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5430.json index 308b84b6137..0002f4cb56e 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5430.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5430.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5430", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-02T05:16:09.920", - "lastModified": "2025-06-02T05:16:09.920", + "lastModified": "2025-06-02T13:15:22.277", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.584257", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5431.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5431.json index 8f0dd1e5417..5cd756d7258 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5431.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5431.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5431", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-02T06:15:20.740", - "lastModified": "2025-06-02T06:15:20.740", + "lastModified": "2025-06-02T13:15:22.403", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?id.310764", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5432.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5432.json index 4f69c7b79e4..de472a19a1a 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5432.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5432.json @@ -2,7 +2,7 @@ "id": "CVE-2025-5432", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-02T06:15:21.023", - "lastModified": "2025-06-02T06:15:21.023", + "lastModified": "2025-06-02T13:15:22.523", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +132,10 @@ { "url": "https://vuldb.com/?id.310765", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json new file mode 100644 index 00000000000..8b0fa5475a9 --- /dev/null +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5443", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-02T12:15:26.143", + "lastModified": "2025-06-02T12:15:26.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310782", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310782", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.584365", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.linksys.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json new file mode 100644 index 00000000000..9aad81f623d --- /dev/null +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5444", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-02T12:15:26.337", + "lastModified": "2025-06-02T12:15:26.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this vulnerability is the function RP_UpgradeFWByBBS of the file /goform/RP_UpgradeFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_7/7.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310783", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310783", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.584366", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.linksys.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json new file mode 100644 index 00000000000..93dad295abf --- /dev/null +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5445", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-02T13:15:22.910", + "lastModified": "2025-06-02T13:15:22.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310784", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310784", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.584367", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.linksys.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5446.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5446.json new file mode 100644 index 00000000000..49f83815992 --- /dev/null +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5446.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-5446", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-02T13:15:23.097", + "lastModified": "2025-06-02T13:15:23.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been classified as critical. This affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. The manipulation of the argument pwd leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_9/9.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.310785", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.310785", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.584368", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.linksys.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 440a11bb1f2..4fb721cec75 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-02T12:00:22.692386+00:00 +2025-06-02T14:00:19.743193+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-02T11:15:23.260000+00:00 +2025-06-02T13:59:05.650000+00:00 ``` ### Last Data Feed Release @@ -33,34 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -296195 +296209 ``` ### CVEs added in the last Commit Recently added CVEs: `14` -- [CVE-2025-0073](CVE-2025/CVE-2025-00xx/CVE-2025-0073.json) (`2025-06-02T11:15:21.067`) -- [CVE-2025-0819](CVE-2025/CVE-2025-08xx/CVE-2025-0819.json) (`2025-06-02T11:15:21.707`) -- [CVE-2025-1246](CVE-2025/CVE-2025-12xx/CVE-2025-1246.json) (`2025-06-02T11:15:21.823`) -- [CVE-2025-1750](CVE-2025/CVE-2025-17xx/CVE-2025-1750.json) (`2025-06-02T10:15:20.557`) -- [CVE-2025-29785](CVE-2025/CVE-2025-297xx/CVE-2025-29785.json) (`2025-06-02T11:15:21.953`) -- [CVE-2025-3260](CVE-2025/CVE-2025-32xx/CVE-2025-3260.json) (`2025-06-02T10:15:21.740`) -- [CVE-2025-3454](CVE-2025/CVE-2025-34xx/CVE-2025-3454.json) (`2025-06-02T11:15:22.167`) -- [CVE-2025-47272](CVE-2025/CVE-2025-472xx/CVE-2025-47272.json) (`2025-06-02T11:15:22.557`) -- [CVE-2025-47289](CVE-2025/CVE-2025-472xx/CVE-2025-47289.json) (`2025-06-02T11:15:22.710`) -- [CVE-2025-48494](CVE-2025/CVE-2025-484xx/CVE-2025-48494.json) (`2025-06-02T11:15:22.867`) -- [CVE-2025-5439](CVE-2025/CVE-2025-54xx/CVE-2025-5439.json) (`2025-06-02T10:15:21.907`) -- [CVE-2025-5440](CVE-2025/CVE-2025-54xx/CVE-2025-5440.json) (`2025-06-02T10:15:22.180`) -- [CVE-2025-5441](CVE-2025/CVE-2025-54xx/CVE-2025-5441.json) (`2025-06-02T11:15:23.060`) -- [CVE-2025-5442](CVE-2025/CVE-2025-54xx/CVE-2025-5442.json) (`2025-06-02T11:15:23.260`) +- [CVE-2024-12168](CVE-2024/CVE-2024-121xx/CVE-2024-12168.json) (`2025-06-02T13:15:20.517`) +- [CVE-2025-26396](CVE-2025/CVE-2025-263xx/CVE-2025-26396.json) (`2025-06-02T13:15:21.367`) +- [CVE-2025-46806](CVE-2025/CVE-2025-468xx/CVE-2025-46806.json) (`2025-06-02T13:15:21.600`) +- [CVE-2025-46807](CVE-2025/CVE-2025-468xx/CVE-2025-46807.json) (`2025-06-02T12:15:24.800`) +- [CVE-2025-48495](CVE-2025/CVE-2025-484xx/CVE-2025-48495.json) (`2025-06-02T12:15:25.380`) +- [CVE-2025-48745](CVE-2025/CVE-2025-487xx/CVE-2025-48745.json) (`2025-06-02T13:15:21.897`) +- [CVE-2025-48955](CVE-2025/CVE-2025-489xx/CVE-2025-48955.json) (`2025-06-02T12:15:25.523`) +- [CVE-2025-48957](CVE-2025/CVE-2025-489xx/CVE-2025-48957.json) (`2025-06-02T12:15:25.680`) +- [CVE-2025-48958](CVE-2025/CVE-2025-489xx/CVE-2025-48958.json) (`2025-06-02T12:15:25.840`) +- [CVE-2025-48990](CVE-2025/CVE-2025-489xx/CVE-2025-48990.json) (`2025-06-02T12:15:25.997`) +- [CVE-2025-5443](CVE-2025/CVE-2025-54xx/CVE-2025-5443.json) (`2025-06-02T12:15:26.143`) +- [CVE-2025-5444](CVE-2025/CVE-2025-54xx/CVE-2025-5444.json) (`2025-06-02T12:15:26.337`) +- [CVE-2025-5445](CVE-2025/CVE-2025-54xx/CVE-2025-5445.json) (`2025-06-02T13:15:22.910`) +- [CVE-2025-5446](CVE-2025/CVE-2025-54xx/CVE-2025-5446.json) (`2025-06-02T13:15:23.097`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `9` -- [CVE-2025-40909](CVE-2025/CVE-2025-409xx/CVE-2025-40909.json) (`2025-06-02T11:15:22.310`) +- [CVE-2024-26467](CVE-2024/CVE-2024-264xx/CVE-2024-26467.json) (`2025-06-02T13:46:43.653`) +- [CVE-2024-26468](CVE-2024/CVE-2024-264xx/CVE-2024-26468.json) (`2025-06-02T13:55:25.737`) +- [CVE-2024-28286](CVE-2024/CVE-2024-282xx/CVE-2024-28286.json) (`2025-06-02T13:59:05.650`) +- [CVE-2025-47289](CVE-2025/CVE-2025-472xx/CVE-2025-47289.json) (`2025-06-02T13:15:21.743`) +- [CVE-2025-49113](CVE-2025/CVE-2025-491xx/CVE-2025-49113.json) (`2025-06-02T13:15:21.987`) +- [CVE-2025-5428](CVE-2025/CVE-2025-54xx/CVE-2025-5428.json) (`2025-06-02T13:15:22.140`) +- [CVE-2025-5430](CVE-2025/CVE-2025-54xx/CVE-2025-5430.json) (`2025-06-02T13:15:22.277`) +- [CVE-2025-5431](CVE-2025/CVE-2025-54xx/CVE-2025-5431.json) (`2025-06-02T13:15:22.403`) +- [CVE-2025-5432](CVE-2025/CVE-2025-54xx/CVE-2025-5432.json) (`2025-06-02T13:15:22.523`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9b666381b53..e1a883da2b9 100644 --- a/_state.csv +++ b/_state.csv @@ -247281,6 +247281,7 @@ CVE-2024-12164,0,0,e252f13dd9720dcd4131988acbb14108c9d660bac4dc69fb3a06b127cc0ee CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000 CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000 CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000 +CVE-2024-12168,1,1,00d2c546c11a236b0cfeb984a17951f770ce5e9104d3a5f1bf8ced2a2cf20293,2025-06-02T13:15:20.517000 CVE-2024-12169,0,0,2cb4d326eb74962f36bd473143efe22c253e3ffb801c22c8001cea0ca8bcb67d,2025-03-27T16:45:46.410000 CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000 CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000 @@ -254752,8 +254753,8 @@ CVE-2024-26462,0,0,25f2254d778b889a2851e66f6c411f8a73b90524a128dab651aec48b5cdb8 CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000 CVE-2024-26465,0,0,ade97cdb5c6cf4f48879f07ad4a7605a0c64a0d603fc472a6f3229d145ef5dca,2024-11-25T19:15:08.960000 CVE-2024-26466,0,0,dc82b286483ed0081f723ee3516747e22293d5c74e6b30bbf9650bedfe3ba1c3,2025-05-19T12:48:52.820000 -CVE-2024-26467,0,0,0556c1f5024bed78dda2024dd14eee20e33c16b9bdc12609f766a3b6d9a8ca63,2024-11-21T09:02:27.513000 -CVE-2024-26468,0,0,99256accb4864d104f28d89d5eb4ed4c821639f1d2602e389e37b0eb4c8fc7a1,2024-11-21T09:02:27.717000 +CVE-2024-26467,0,1,b500d420921049b8fd4623514a671ad1adc39001df3a95f0e4b096c166702a21,2025-06-02T13:46:43.653000 +CVE-2024-26468,0,1,cb9a2a0b675bae026341df25e5965cdc1a11555ba271a5ad0bd8f1416d0e5d50,2025-06-02T13:55:25.737000 CVE-2024-26469,0,0,9e4d593902085f4092c8cab6fbd5cadf0d15ba8323e2da1cf6d86de4feb54a4f,2025-05-13T14:22:16.917000 CVE-2024-2647,0,0,bbe1a272a76fd31c1c6ab2c26f30c3c63771d99203be4f6b4b60845ea9cf719b,2025-02-10T13:49:48.360000 CVE-2024-26470,0,0,5e30fb9ed298680eb1509fddcf64925b43bcf3998f5c1cf22223f32f773def6f,2025-04-30T16:52:55.830000 @@ -256357,7 +256358,7 @@ CVE-2024-28279,0,0,371a6db4bfcfaa0c72291cbc279291879c814e6e774d39db4e4c005f7e298 CVE-2024-2828,0,0,79034e33018335efad10934558e8b84384b5f2f2133fce62438d617ea963efcf,2024-11-21T09:10:37.513000 CVE-2024-28283,0,0,ce7a9c7cebaf258528c4f64296c4349b2ca8196425fb75250670fc71bac6a199,2024-11-21T09:06:08.270000 CVE-2024-28285,0,0,d6af77d4c1b881ace2cde569269de77c400ab0444445e8beeda0612dd6100440,2024-11-21T09:06:08.497000 -CVE-2024-28286,0,0,443b71b447874d7e85414d39090dd3f2383fef5e0435d3fe6410bb9a66f0c9f4,2024-11-21T09:06:08.723000 +CVE-2024-28286,0,1,0757249cbaa15bc07df502c32c1b53781d52e423b8f162fc3de5e29bd12f0076,2025-06-02T13:59:05.650000 CVE-2024-28287,0,0,a8c69a5ccabbb193237debf5f07040ef395a0f376f000c1003682d3fc4f3b2ce,2024-11-21T09:06:08.947000 CVE-2024-28288,0,0,917c615d247f423af0c4696050d5dac2e677cd6cdc4f1d78fcb72e3632aa5e47,2024-11-21T09:06:09.163000 CVE-2024-2829,0,0,5d6ede104c5f721bc49057f0a400b43bce14f079f98156f2630e18adcc15a282,2024-12-12T17:32:37.870000 @@ -282371,7 +282372,7 @@ CVE-2025-0069,0,0,d7ac8ba36cfcab8a8836c1588e52e8bbaed2d415e393c11bf82b7bb82617b0 CVE-2025-0070,0,0,dbf9edc467887c587ee503735d983d3eb618b4cd55fb133fb8e2178f124d6f6b,2025-01-14T01:15:17.427000 CVE-2025-0071,0,0,a9f17b8587d9681508885fa05b5cb6e1fb480f5738675f612162a9b567f90271,2025-03-11T01:15:33.917000 CVE-2025-0072,0,0,7c68681d522f867cd278cffcb4470ef78b9648796a6206167a2247ec164299a1,2025-05-12T16:15:21.587000 -CVE-2025-0073,1,1,e612b82ce7aceb5e22ac6e6c5a7d01a7a284ab1a80d6f17bf536b26f9203eb73,2025-06-02T11:15:21.067000 +CVE-2025-0073,0,0,e612b82ce7aceb5e22ac6e6c5a7d01a7a284ab1a80d6f17bf536b26f9203eb73,2025-06-02T11:15:21.067000 CVE-2025-0101,0,0,391653291dbc9e356bdd9f7cf48cb4ee16c22960b84cfac559c323183419fbd8,2025-04-16T13:25:37.340000 CVE-2025-0103,0,0,06fd8d922bac50d8ab7e8102b5457a5978f502265c9b1059554ccaf6e0c9679c,2025-01-11T03:15:22.020000 CVE-2025-0104,0,0,dc4c81878786bc602ee20c50b1dae485c1da904352cbab72ccb96b2a9dcd9e75,2025-01-11T03:15:22.183000 @@ -282945,7 +282946,7 @@ CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf CVE-2025-0815,0,0,f73b50d64016c2e64fd2df2d6c90edb74018594168bb3b9f019d2de177423288,2025-02-13T07:15:11.160000 CVE-2025-0816,0,0,d49cff9b1300ba83e836640c26fee4d28d3c84d54249c4f7af3bef6763c2c81e,2025-02-13T07:15:11.353000 CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000 -CVE-2025-0819,1,1,50a9643f2ab349d33a7d5834da9052f27f85d7c0df2fe60b842822c4fff1cf26,2025-06-02T11:15:21.707000 +CVE-2025-0819,0,0,50a9643f2ab349d33a7d5834da9052f27f85d7c0df2fe60b842822c4fff1cf26,2025-06-02T11:15:21.707000 CVE-2025-0820,0,0,6d45f28eb00b0039ad804e065c885bf40234d2bcc3aa26a58867a7f5eaafc285,2025-03-01T05:15:15.953000 CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000 CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000 @@ -283285,7 +283286,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000 CVE-2025-1244,0,0,ca7dde03c53f2f538c0b12fb599e84ae66a426ff6488b7e67f4989aba1f7a6f7,2025-03-13T14:15:34.977000 CVE-2025-1245,0,0,1f44b48d866bcc8251435e1f8580e9a7c9edc0ad7da6e06f008dba048b954524,2025-05-16T14:42:18.700000 -CVE-2025-1246,1,1,0251c2ff86aa80d3f3c492ca4aeeab9dd727fa21cb46bb08a619161352af0126,2025-06-02T11:15:21.823000 +CVE-2025-1246,0,0,0251c2ff86aa80d3f3c492ca4aeeab9dd727fa21cb46bb08a619161352af0126,2025-06-02T11:15:21.823000 CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000 CVE-2025-1249,0,0,6a7f3a2500b58cdcea7c9e46385c15368818268591d8a8d12de3eb4b42bd3d72,2025-02-26T15:15:24.470000 CVE-2025-1252,0,0,9716250bcf118be27f9d89f5f8b184767026e3acfd92390347cf9e55a42d7d4b,2025-05-08T14:39:09.683000 @@ -283684,7 +283685,7 @@ CVE-2025-1746,0,0,2ad65a9dbdf0c4381f281d77fa741dce6ba1f1df02159548941e5a1db121f3 CVE-2025-1747,0,0,fe9fc1715d54827a665282361c4a912da2b8a4104647978512bc0ae9117ef282,2025-05-07T19:47:20.830000 CVE-2025-1748,0,0,27c7d2fcd6085847315aeadd07a684f6a91809737cbc365c466e57be1af34067,2025-05-07T19:47:43.517000 CVE-2025-1749,0,0,6db79c896d97ba53b839effabd14a076d6b2af29f854eac41ba251a1f2db4f18,2025-05-07T19:49:23.300000 -CVE-2025-1750,1,1,48616090589d6dc02a6bf1431b0e611036832583e27deee68a22de22ba14a676,2025-06-02T10:15:20.557000 +CVE-2025-1750,0,0,48616090589d6dc02a6bf1431b0e611036832583e27deee68a22de22ba14a676,2025-06-02T10:15:20.557000 CVE-2025-1751,0,0,abfc84328e2199f31a54a26b50388e665ca54aab7fd0cce8bda2194b6d823604,2025-02-27T12:15:35.030000 CVE-2025-1752,0,0,67bdd52861cadb9ec44fc5e063c3f2c1275aef4202dd498970e70f4ea7d1426e,2025-05-12T18:15:43.960000 CVE-2025-1753,0,0,3593b6ba50ede630959d5ea37be4b1eda351a397f05e35b03d360630d3f61397,2025-05-28T15:01:30.720000 @@ -288476,6 +288477,7 @@ CVE-2025-26389,0,0,69c0b4482301cbdf7810c0d66dde175a8a55879ae4b001f43aded2e047b17 CVE-2025-2639,0,0,eeccd7e86f1a8e6550900d4406a77fd9c06a6948c701e759827649fddf007255,2025-03-28T19:33:14.553000 CVE-2025-26390,0,0,d486511ec0cd7e022494115d025bafe0774221a17a1b54e8ff55467ae4483ee1,2025-05-13T19:35:18.080000 CVE-2025-26393,0,0,0084efd52fbee3d09de405c3fe48d1fbc4bd7655a73c657547c37f33e81d553f,2025-03-17T20:15:14.140000 +CVE-2025-26396,1,1,3fec10aa99b62ec6557c26ff189fae94e929e21d16192c5bd4df833d6411ad26,2025-06-02T13:15:21.367000 CVE-2025-2640,0,0,cb1c6d71f05715e40a599d54b3e503bcebd1109fe2ad2ac7ebfd5568ea675609,2025-04-02T14:26:23.040000 CVE-2025-26401,0,0,8a8a5edf8458e0cd9c5461b93aa3dd8d7a38c5486b82730ab0a36983d22db1ca,2025-04-07T14:18:15.560000 CVE-2025-26408,0,0,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000 @@ -290135,7 +290137,7 @@ CVE-2025-29781,0,0,9602edcc5b5c6ecdfd105a84695ee56cace470c55953ae06faefbf1153141 CVE-2025-29782,0,0,642561341fd441d3b75649151bd8fd2cc9789f9959ceab4d0a40abb896c0a19e,2025-03-25T20:12:23.047000 CVE-2025-29783,0,0,45d2b00d8a588bece93df8bfaa38fd733283ba2670cda9e32612d412a0ff1e78,2025-03-22T01:15:30.443000 CVE-2025-29784,0,0,9f5fac5d056c47dae0ae6358dac107544bc727213e81bb0b162611aa4d061032,2025-05-13T15:41:25.090000 -CVE-2025-29785,1,1,750962f6f73f51bc8b03e2336174d8fa0d016d6d8ea86e623234458269a10d57,2025-06-02T11:15:21.953000 +CVE-2025-29785,0,0,750962f6f73f51bc8b03e2336174d8fa0d016d6d8ea86e623234458269a10d57,2025-06-02T11:15:21.953000 CVE-2025-29786,0,0,451b93240c4543f3def3ea2c9521ecc2be3354f0b552d41bf2a019283f00a79d,2025-03-17T14:15:22.237000 CVE-2025-29787,0,0,2fd3435cc0f680f18716d607bc13a6c7a954d55969aae7d30fd344637489ec1d,2025-03-17T14:15:22.447000 CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5bc67,2025-03-17T14:15:22.653000 @@ -292308,7 +292310,7 @@ CVE-2025-32596,0,0,f1872f78910abd93ca6bc44a668b64d9a217aba1c01ee357a12dfaef6efc9 CVE-2025-32597,0,0,55ab5ca6ed3d8b6cf0931426c8147ebabb322fbbc0aae4fae4f5b3289fb12ce9,2025-04-09T20:02:41.860000 CVE-2025-32598,0,0,cdac3f432b75d5f00695f6f1edf0fbf1140369b9893f469b35a81ca8a52c54b6,2025-04-15T15:16:09.180000 CVE-2025-32599,0,0,2831ce4b5b42e6325ce283503c26f9c21788129405d17dc22b338c3d4b2bbf42,2025-04-11T15:39:52.920000 -CVE-2025-3260,1,1,f911df05b90ec3abce4ce5a349fced2077b60173eb43728f25af08432508f724,2025-06-02T10:15:21.740000 +CVE-2025-3260,0,0,f911df05b90ec3abce4ce5a349fced2077b60173eb43728f25af08432508f724,2025-06-02T10:15:21.740000 CVE-2025-32600,0,0,083cfb813b0e4faf3c70b5e5f02105068f0caedfb180899d4577e64e9ef1444f,2025-04-11T15:39:52.920000 CVE-2025-32601,0,0,684526a644a2d5bc9b83c4eb6c253fb64f18b24d4f5112267400e5345b8fc15c,2025-04-11T15:39:52.920000 CVE-2025-32602,0,0,148b28f7e108599f04bd783492c1327b9adeb61a0cf6bda137e87e19db0937c2,2025-04-17T20:21:05.203000 @@ -292794,7 +292796,7 @@ CVE-2025-34490,0,0,ff6ccf68d08b2145b1b0c3fd30524d8f343b67a475d00c1c0efae114546b6 CVE-2025-34491,0,0,faad48875b9db7a8e22a3e33d04e2680f19102abb22a8bb70d5a70d93b5c1ed5,2025-05-10T00:58:12.427000 CVE-2025-3452,0,0,a0af240b89728ab4c39e75e741754c068d979812f93583676566bf2c295ab7ec,2025-05-06T15:35:58.647000 CVE-2025-3453,0,0,6d4c3756403d2c169f24bd9cd170cc74dc819f8c072954929ebcb8b579bf19de,2025-04-17T20:21:48.243000 -CVE-2025-3454,1,1,4aac0cbec8eb4ae4b6c0be315a75103ac49d2f14e3429207314c7ab0889558d6,2025-06-02T11:15:22.167000 +CVE-2025-3454,0,0,4aac0cbec8eb4ae4b6c0be315a75103ac49d2f14e3429207314c7ab0889558d6,2025-06-02T11:15:22.167000 CVE-2025-3455,0,0,27fc2bff0afea6de93406ff695251ef67a3d625051a2b866cd1a3908c7fd4f8e,2025-05-12T17:32:32.760000 CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000 CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000 @@ -293887,7 +293889,7 @@ CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000 CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000 CVE-2025-40908,0,0,9e6f7c01493ad7d898ae71483c9feee0a759fd2cb47de6da8eb69ddcf35d1f6b,2025-06-02T04:15:38.817000 -CVE-2025-40909,0,1,02c8b40ddd4de52276b8a411f275c217854d3f11ab470f013187260e9276ea09,2025-06-02T11:15:22.310000 +CVE-2025-40909,0,0,02c8b40ddd4de52276b8a411f275c217854d3f11ab470f013187260e9276ea09,2025-06-02T11:15:22.310000 CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000 CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000 CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000 @@ -295004,6 +295006,8 @@ CVE-2025-46802,0,0,e0845e0a2badfb8351bf85ec4dfd1c99c7e29caf4bb332a81fa1375afc25e CVE-2025-46803,0,0,0a5de4a7042abfff99e6c11ab58d1e1483a67b11f4bef7e11f8857a336030c12,2025-05-28T15:01:30.720000 CVE-2025-46804,0,0,33150bb68c13eed9accf4cb312a19408b88b9f75691eb7f11163f9cad134f711,2025-05-28T15:01:30.720000 CVE-2025-46805,0,0,b1097088aa0dbd2e4b45c8b3983be6a33e94edc138942af1ff1720f9da99ad58,2025-05-28T15:01:30.720000 +CVE-2025-46806,1,1,603ad39c04d3b6dfb4d74e2a6593c9cafab3fcac7b5373b3a24f9b62ae31d289,2025-06-02T13:15:21.600000 +CVE-2025-46807,1,1,1c6a320639dd7d05bae2073dca3f030f06f77af255e7f77dab44f866bfed0685,2025-06-02T12:15:24.800000 CVE-2025-46812,0,0,efbba45e18cc8937b9f87a0e29f466265a1e1be9d804a38357596ef0f2987dda,2025-05-12T17:32:52.810000 CVE-2025-46813,0,0,01deee0db3f748e6f8e958a47d5a96825a2f5d578da6e58d6d8c34dd9ef7b2a5,2025-05-05T20:54:19.760000 CVE-2025-46814,0,0,a39c61eb85c9c40f8b1a1b3b957ff5b21067cc488cde122058f10a18468e916d,2025-05-07T14:13:20.483000 @@ -295077,7 +295081,7 @@ CVE-2025-47269,0,0,b9d52d64e2c0cec1ecdcd2f4d7408887dda629b4e369e1e7b2409608db43d CVE-2025-4727,0,0,170e11f6923ca5cbfd0f6244eaf161be67d9ce2c6a5c3f835565b0bb279da21f,2025-05-16T14:42:18.700000 CVE-2025-47270,0,0,f7de4b1bbad67df8d0ed8562ed81ad54a4a617d8e905a95b0012c5c493a9cba4,2025-05-12T17:32:32.760000 CVE-2025-47271,0,0,b4dba60dfb0342c7663df3f21e36f0d1e4cac1426ea6dff373e34c92771a1236,2025-05-12T17:32:32.760000 -CVE-2025-47272,1,1,673f7322859d6f32fb1497b6ed4be038670e6640abdea24d95158af6335ee00f,2025-06-02T11:15:22.557000 +CVE-2025-47272,0,0,673f7322859d6f32fb1497b6ed4be038670e6640abdea24d95158af6335ee00f,2025-06-02T11:15:22.557000 CVE-2025-47273,0,0,8a015bdd65fd76310e1f3acdca4cc1889577f5d468ae1e2f275ffca260b8e7ee,2025-05-28T15:15:25.080000 CVE-2025-47274,0,0,fad3fb606ae045fd813c37388dd60dff1a0ba71c69c4422b81f53361cf7f503f,2025-05-12T17:32:32.760000 CVE-2025-47275,0,0,c08b4ed4e8318278685cc65ac12c1f286376fdd04ac329814f0f17ec3e430d14,2025-05-16T14:42:18.700000 @@ -295093,7 +295097,7 @@ CVE-2025-47284,0,0,927b09b86a7bb19dbf3e9d0808f921b2d28747e702e8d9ec13ede5b5a7267 CVE-2025-47285,0,0,a4b322cfa16ac0198aad5626c2233334a81e0c8124806adefa631e6ad6b3d8e6,2025-05-16T14:43:26.160000 CVE-2025-47287,0,0,4a03b7a85e9f4f1ae469c2f4edaad7e40d35a7308b2c4cacf7afd6a1813a45c3,2025-05-29T06:15:23.090000 CVE-2025-47288,0,0,4f46812765e170d3e0663ea32f05e904834e57f589f5c764ae983ba008d7452b,2025-05-30T16:31:03.107000 -CVE-2025-47289,1,1,f7a8fb4cc0a5caf3a83a772f3c1608108dbd2e7c44c8802b4229ec2f270e31b3,2025-06-02T11:15:22.710000 +CVE-2025-47289,0,1,09cb84c673d83325feab8cd735aaca2413f90bf61c59c4bcaed6123f411e9d81,2025-06-02T13:15:21.743000 CVE-2025-4729,0,0,073b70e77ba60376073b6bf036503b0e9d4ab1ba93aced39541912843c902c9b,2025-05-16T14:42:18.700000 CVE-2025-47290,0,0,fef9205d946b23690e870377651d8631936053bea9e3a05a823cfda120b52c00,2025-05-21T20:24:58.133000 CVE-2025-47291,0,0,77c2613c093f23da4845bc4516f16594af2697fccb6f4c62fbf6122c314ea551,2025-05-21T20:24:58.133000 @@ -295722,7 +295726,8 @@ CVE-2025-4849,0,0,79bafc8d78c1efc632ed95ad4a130766ed5d90c45e45605773df0d46773756 CVE-2025-48490,0,0,87ecfeb6e490715223675b6987710680d7319b22f1f72e859b8289d6cc58a36f,2025-05-30T16:31:03.107000 CVE-2025-48491,0,0,192909d10acf6a2f5c7dbd7cf4a77eb5c3f60df46b3da837effcf5a7a7693800,2025-05-30T16:31:03.107000 CVE-2025-48492,0,0,27f020803580a5c4453e15c7140e9561136d4680304daf59a0f7133793e5d193,2025-05-30T16:31:03.107000 -CVE-2025-48494,1,1,5745fb806ce299632f2531b42815e36bb1c9c8377243e0f319ec99a0550ef850,2025-06-02T11:15:22.867000 +CVE-2025-48494,0,0,5745fb806ce299632f2531b42815e36bb1c9c8377243e0f319ec99a0550ef850,2025-06-02T11:15:22.867000 +CVE-2025-48495,1,1,fe5c88c6ea2ca72185cecedb50ad11f9b1ee65a3599da0cdcaa0274975580e8d,2025-06-02T12:15:25.380000 CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000 CVE-2025-4851,0,0,e5a9ac67f494616a05e2f84fff689d174d4a8c96dcdf95534865dd01a2cf2a1b,2025-05-24T01:03:29.400000 CVE-2025-4852,0,0,8056c97adb54f901af1b48f1e44b7ca1809889745baa2872bb19324ac5d93e7f,2025-05-19T15:15:34.693000 @@ -295756,6 +295761,7 @@ CVE-2025-48741,0,0,75001d0705bc789d943f76109b8b14a126d281e251509064c5cca96008e10 CVE-2025-48742,0,0,5f33c781ef30502ef2e246627292bc67d88c79205c0f59dcb70501ff4a68f09c,2025-05-29T17:15:21.900000 CVE-2025-48743,0,0,24d943dbdb45a4fa6b30762dbd53504c04a4380cb55364901f38457df34be0b5,2025-05-28T15:01:30.720000 CVE-2025-48744,0,0,2bdd08647659ee3f558bb4b4bded879f1ed8d92273df3815d9aaa6c8cd04d2b8,2025-05-28T15:01:30.720000 +CVE-2025-48745,1,1,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000 CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000 CVE-2025-48747,0,0,8c3baf0ee9646e657c0ba351a53bca2d3d39df6e364e578cbb75404ea4e19368,2025-05-29T14:29:50.247000 CVE-2025-48748,0,0,379223c1d681caf1cc4eae8f0abea64ba33403c2868d28f8d0d01bb8de57655a,2025-05-30T16:31:03.107000 @@ -295837,10 +295843,14 @@ CVE-2025-48946,0,0,1a27a6f457ae10610e9029a593882fe63dffb628eae1e50404a3c7d290e45 CVE-2025-48948,0,0,ca75e8c9851d84ae181b6b16f7e3dd9c6089c2140c1ef03716877d045b38e2d4,2025-05-30T20:15:43.910000 CVE-2025-48949,0,0,4e76516c9619345b129c182f65062ed50a58136a10adc9889a0de68842130806,2025-05-30T20:15:44.083000 CVE-2025-4895,0,0,451159abdd179506166eda92c0cc3ecdcfca15d4a903bf6a2c0ccf029c166653,2025-05-21T19:37:48.777000 +CVE-2025-48955,1,1,e866020b5e53cd957bc33457946ef98a259e2748730b0523cd3a756f2ee07e50,2025-06-02T12:15:25.523000 +CVE-2025-48957,1,1,0bb9005e25d05f04f7168f81837919e34950d9cf87042ea4188ad6efc5d9339e,2025-06-02T12:15:25.680000 +CVE-2025-48958,1,1,c67b68371e8bfae6a779f69aa2d3c70fb8dff5d80a7f298972784a871b72d1d2,2025-06-02T12:15:25.840000 CVE-2025-4896,0,0,eb43857d84c4e3c0ca9bf4ac15086d7606c87aaeb17237d45e10278d3431115c,2025-05-27T16:30:13.490000 CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000 CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000 CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000 +CVE-2025-48990,1,1,53563761e0abc7a3ca88976c33667a47da4f8dc3c5f72a17ecf7203538dc6a56,2025-06-02T12:15:25.997000 CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee63,2025-05-21T19:37:15.790000 CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000 CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000 @@ -295854,7 +295864,7 @@ CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d CVE-2025-4910,0,0,d0c7584b70570a0f60f72259e5222dec42c6f070aafbec7da031c0738cd595d2,2025-05-21T17:40:58.137000 CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f3696f,2025-05-21T13:26:25.383000 CVE-2025-49112,0,0,68b9f8ae8378455b94697490a4c9482a35ead35162dc1f57c6769030fa5d1d53,2025-06-02T05:15:21.277000 -CVE-2025-49113,0,0,358ac32f89451109a971e873fdac6b608e79e1801d399ebf53ee99796c6b9da4,2025-06-02T05:15:53.420000 +CVE-2025-49113,0,1,32d36c52070530467b17daab5505f8aec0de856bdbbf3bfcf6775e31c5175692,2025-06-02T13:15:21.987000 CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000 CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000 CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000 @@ -296178,19 +296188,23 @@ CVE-2025-5424,0,0,8846307422a1e70afaa4472c8339f8684a9ad79dc12a6b1e4401dcca541b41 CVE-2025-5425,0,0,be91d19736e14b87d2d7a8a21cf7155dfcdc6ebc2c74f44b7cabd08f35eb48eb,2025-06-02T03:15:25.537000 CVE-2025-5426,0,0,57cb772d14527dbc6e6a63b12d5b01bad3ac902c3f8c60c73dd5ff0ee844eb33,2025-06-02T03:15:25.717000 CVE-2025-5427,0,0,7248241b6511e7dae2909aae008975c5e1d909b0fa9a2d42cb023cab3ad79f41,2025-06-02T04:15:44 -CVE-2025-5428,0,0,8e37e3d63a4fe3eb041bc551acaf6d51874f670999761815a63f3357c2185ba8,2025-06-02T04:15:44.977000 +CVE-2025-5428,0,1,8de7c8b73073abc1d37c3198f867a27f29ebbbad4190b2dd6629572e7d38630e,2025-06-02T13:15:22.140000 CVE-2025-5429,0,0,d3b059787ffa7e06d4a4aef3851efbbfa5534e20659ffd5b3f55c63550568be6,2025-06-02T05:16:08.447000 -CVE-2025-5430,0,0,9c8ff751e513a786224c51fe5c3552be7b4d78ad672aaba460fa4a9f98a16c6a,2025-06-02T05:16:09.920000 -CVE-2025-5431,0,0,efefbcf239cea408ae0e3ee2472f3f1a37ba8c9e3dce439dcb4ab817f2a98a32,2025-06-02T06:15:20.740000 -CVE-2025-5432,0,0,d572dc3edae46e5957de45fa4ac2dd9d097546a0d1041dbbae03cd7598f7b12e,2025-06-02T06:15:21.023000 +CVE-2025-5430,0,1,575998dfdc58bf78895e6505775ceb47d8fb5a44c64b642741ea3c1e2d02041c,2025-06-02T13:15:22.277000 +CVE-2025-5431,0,1,994e477235c446060bbb3fd20ba0a9dde6f8fc0485f87b1341fbed2c0eb64a07,2025-06-02T13:15:22.403000 +CVE-2025-5432,0,1,1606ccb952e02573ce9e9ce8f262975d836a490db658823d9e039892725ade78,2025-06-02T13:15:22.523000 CVE-2025-5433,0,0,c8bef5e02889d81d9820bc4f7df922d26d02dd5fb2e601c82875e353e00ca72f,2025-06-02T07:15:22 CVE-2025-5434,0,0,4e7c75fc3ac4e181befe9a93c9c12ef65751e8d2fe55da16447e5daadcd83eaa,2025-06-02T07:15:22.230000 CVE-2025-5435,0,0,dcf4258cf6809dfc182d62df7089a871748c9b139044f7b2923e29e48b3038b5,2025-06-02T08:15:21.230000 CVE-2025-5436,0,0,d68e6cc48ff07effcdabcbcf49258634252ea2262182e54eb43102662626e959,2025-06-02T08:15:21.437000 CVE-2025-5437,0,0,3052fa6936274bb3eba99317d3e4daab84fd4fe1ceb685290dca60c7fa3d1a04,2025-06-02T09:15:21.027000 CVE-2025-5438,0,0,990c843261638a390371e7714161b5d3176423efe5d9172f5f232f3bddb512be,2025-06-02T09:15:21.280000 -CVE-2025-5439,1,1,aa110c46dc286c7e9d8cb2d97815d673f115d30b33674e0d9da42bae02a93b74,2025-06-02T10:15:21.907000 -CVE-2025-5440,1,1,23a278cff435d5c44ccef8150e6637344c9029c328600fd3b807a6015b6ed757,2025-06-02T10:15:22.180000 -CVE-2025-5441,1,1,64777ca5b3f1848321cc862bac1cadce8406dedce7ee060897eb18bc57816364,2025-06-02T11:15:23.060000 -CVE-2025-5442,1,1,4cfa2491529f3adc5b1beaec9350343f83487af1e2dc30a5f11bee6aa59c5a28,2025-06-02T11:15:23.260000 +CVE-2025-5439,0,0,aa110c46dc286c7e9d8cb2d97815d673f115d30b33674e0d9da42bae02a93b74,2025-06-02T10:15:21.907000 +CVE-2025-5440,0,0,23a278cff435d5c44ccef8150e6637344c9029c328600fd3b807a6015b6ed757,2025-06-02T10:15:22.180000 +CVE-2025-5441,0,0,64777ca5b3f1848321cc862bac1cadce8406dedce7ee060897eb18bc57816364,2025-06-02T11:15:23.060000 +CVE-2025-5442,0,0,4cfa2491529f3adc5b1beaec9350343f83487af1e2dc30a5f11bee6aa59c5a28,2025-06-02T11:15:23.260000 +CVE-2025-5443,1,1,5598bb6eea21bd13765afe37d6570c2e26dc8a78ef3614e8a741492174c69c78,2025-06-02T12:15:26.143000 +CVE-2025-5444,1,1,d544dbe8f2268ff7850a7c0dc85fc51888e589c75a04a384cb8526b00af58fc4,2025-06-02T12:15:26.337000 +CVE-2025-5445,1,1,519bf24077154af0e4727aac86b3fc5b5c4cf0c1944316e2c44d42b4bf4316f8,2025-06-02T13:15:22.910000 +CVE-2025-5446,1,1,2943f1b50cf2623a078c7b44d217f150986e93c16c4756ecb5da1f8e47e23a76,2025-06-02T13:15:23.097000 CVE-2025-5455,0,0,8d271c9b47b5647f1f114bae05a0555876aab8060dabdd5d5775e0ee67faf718,2025-06-02T09:15:21.493000