From 891f5d561f34b42e746e7608d019642c96c09337 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 19 Jun 2025 02:03:57 +0000 Subject: [PATCH] Auto-Update: 2025-06-19T02:00:19.760458+00:00 --- CVE-2022/CVE-2022-438xx/CVE-2022-43840.json | 28 ++++++- CVE-2023/CVE-2023-430xx/CVE-2023-43052.json | 31 ++++++- CVE-2023/CVE-2023-447xx/CVE-2023-44755.json | 33 +++++++- CVE-2024/CVE-2024-226xx/CVE-2024-22653.json | 32 ++++++- CVE-2024/CVE-2024-452xx/CVE-2024-45208.json | 68 +++++++++++++++ CVE-2025/CVE-2025-231xx/CVE-2025-23121.json | 44 ++++++++++ CVE-2025/CVE-2025-231xx/CVE-2025-23168.json | 60 +++++++++++++ CVE-2025/CVE-2025-231xx/CVE-2025-23169.json | 60 +++++++++++++ CVE-2025/CVE-2025-231xx/CVE-2025-23170.json | 60 +++++++++++++ CVE-2025/CVE-2025-231xx/CVE-2025-23171.json | 60 +++++++++++++ CVE-2025/CVE-2025-231xx/CVE-2025-23172.json | 60 +++++++++++++ CVE-2025/CVE-2025-231xx/CVE-2025-23173.json | 60 +++++++++++++ CVE-2025/CVE-2025-242xx/CVE-2025-24286.json | 44 ++++++++++ CVE-2025/CVE-2025-242xx/CVE-2025-24287.json | 44 ++++++++++ CVE-2025/CVE-2025-242xx/CVE-2025-24288.json | 48 +++++++++++ CVE-2025/CVE-2025-242xx/CVE-2025-24291.json | 60 +++++++++++++ CVE-2025/CVE-2025-255xx/CVE-2025-25580.json | 28 ++++++- CVE-2025/CVE-2025-255xx/CVE-2025-25585.json | 28 ++++++- CVE-2025/CVE-2025-255xx/CVE-2025-25590.json | 28 ++++++- CVE-2025/CVE-2025-279xx/CVE-2025-27913.json | 28 ++++++- CVE-2025/CVE-2025-290xx/CVE-2025-29058.json | 26 +++++- CVE-2025/CVE-2025-293xx/CVE-2025-29339.json | 29 ++++++- CVE-2025/CVE-2025-327xx/CVE-2025-32790.json | 77 +++++++++++++++-- CVE-2025/CVE-2025-327xx/CVE-2025-32795.json | 52 ++++++++++-- CVE-2025/CVE-2025-446xx/CVE-2025-44612.json | 38 ++++++++- CVE-2025/CVE-2025-446xx/CVE-2025-44614.json | 38 ++++++++- CVE-2025/CVE-2025-446xx/CVE-2025-44619.json | 43 +++++++++- CVE-2025/CVE-2025-449xx/CVE-2025-44906.json | 33 +++++++- CVE-2025/CVE-2025-454xx/CVE-2025-45474.json | 27 +++++- CVE-2025/CVE-2025-458xx/CVE-2025-45878.json | 35 +++++++- CVE-2025/CVE-2025-458xx/CVE-2025-45879.json | 35 +++++++- CVE-2025/CVE-2025-458xx/CVE-2025-45880.json | 35 +++++++- CVE-2025/CVE-2025-477xx/CVE-2025-47748.json | 33 +++++++- CVE-2025/CVE-2025-487xx/CVE-2025-48747.json | 33 +++++++- CVE-2025/CVE-2025-487xx/CVE-2025-48749.json | 33 +++++++- CVE-2025/CVE-2025-488xx/CVE-2025-48887.json | 46 ++++++++-- CVE-2025/CVE-2025-501xx/CVE-2025-50181.json | 60 +++++++++++++ CVE-2025/CVE-2025-51xx/CVE-2025-5136.json | 64 ++++++++++++-- CVE-2025/CVE-2025-51xx/CVE-2025-5198.json | 73 ++++++++++++++-- CVE-2025/CVE-2025-60xx/CVE-2025-6007.json | 81 ++++++++++++++++-- CVE-2025/CVE-2025-60xx/CVE-2025-6008.json | 81 ++++++++++++++++-- CVE-2025/CVE-2025-60xx/CVE-2025-6009.json | 81 ++++++++++++++++-- CVE-2025/CVE-2025-61xx/CVE-2025-6151.json | 80 ++++++++++++++++-- README.md | 60 +++++++++---- _state.csv | 93 ++++++++++++--------- 45 files changed, 2003 insertions(+), 187 deletions(-) create mode 100644 CVE-2024/CVE-2024-452xx/CVE-2024-45208.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23121.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23168.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23169.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23170.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23171.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23172.json create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23173.json create mode 100644 CVE-2025/CVE-2025-242xx/CVE-2025-24286.json create mode 100644 CVE-2025/CVE-2025-242xx/CVE-2025-24287.json create mode 100644 CVE-2025/CVE-2025-242xx/CVE-2025-24288.json create mode 100644 CVE-2025/CVE-2025-242xx/CVE-2025-24291.json create mode 100644 CVE-2025/CVE-2025-501xx/CVE-2025-50181.json diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43840.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43840.json index 1a148d068bf..a776f9f1665 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43840.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43840.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43840", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-04-14T21:15:16.200", - "lastModified": "2025-04-15T21:15:46.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:37:04.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4.0", + "versionEndIncluding": "3.4.4", + "matchCriteriaId": "682EB2AD-DD53-43FC-8A8E-7A3BDE927467" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7169766", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json index 786778487e6..5b13fddde91 100644 --- a/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43052.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43052", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-03-07T17:15:18.060", - "lastModified": "2025-03-07T17:15:18.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:11:36.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,10 +81,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "86853A4E-905D-46A9-BF43-6D6117AA2442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5C510A28-7CFF-414B-A740-13A71CB97271" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7185102", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44755.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44755.json index 34f83d26980..ddb9031f4ad 100644 --- a/CVE-2023/CVE-2023-447xx/CVE-2023-44755.json +++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44755.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44755", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-22T18:15:58.483", - "lastModified": "2025-04-23T14:15:27.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:21:38.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:sacco_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FDC948D1-2B9F-4317-8ED4-73F1BF7C4537" + } + ] + } + ] + } + ], "references": [ { "url": "https://flashy-lemonade-192.notion.site/SQL-injection-in-Sacco-Management-system-via-password-and-id-parameter-1d85fc432de24db896446002f91acfd1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://flashy-lemonade-192.notion.site/SQL-injection-in-Sacco-Management-system-via-password-and-id-parameter-1d85fc432de24db896446002f91acfd1?pvs=4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22653.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22653.json index dade4c4b825..d744179b197 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22653.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22653", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-29T15:15:29.470", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-18T23:57:03.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yasm_project:yasm:2023-09-22:*:*:*:*:*:*:*", + "matchCriteriaId": "CED0EE19-843C-4F9E-AB11-C2912EC1BD3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/TimChan2001/03e5792b15d0a34bfaad970e37c17660", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/yasm/yasm/issues/247", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45208.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45208.json new file mode 100644 index 00000000000..2ec4ae09c83 --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45208.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-45208", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:21.097", + "lastModified": "2025-06-19T00:15:21.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://docs.versa-networks.com/Solutions/System_Hardening/Perform_Manual_Hardening_for_Versa_Director#Harden_Port_4566", + "source": "support@hackerone.com" + }, + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526c3cdc94d6b9f2faf718", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23121.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23121.json new file mode 100644 index 00000000000..6ed9528e2d4 --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23121.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-23121", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:21.260", + "lastModified": "2025-06-19T00:15:21.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user" + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.veeam.com/kb4743", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23168.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23168.json new file mode 100644 index 00000000000..0312d7f0670 --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23168.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23168", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:21.377", + "lastModified": "2025-06-19T00:15:21.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director SD-WAN orchestration platform implements Two-Factor Authentication (2FA) using One-Time Passcodes (OTP) delivered via email or SMS. Versa Director accepts untrusted user input when dispatching 2FA codes, allowing an attacker who knows a valid username and password to redirect the OTP delivery (SMS/email) to their own device. OTP/TOTP codes are not invalidated after use, enabling reuse by an attacker who has previously intercepted or obtained a valid code. In addition, the 2FA system does not adequately restrict the number or frequency of login attempts. The OTP values are generated from a relatively small keyspace, making brute-force attacks more feasible. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends that Director be upgraded to one of the remediated software versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "references": [ + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526512dc94d6b9f2faf715", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23169.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23169.json new file mode 100644 index 00000000000..c1502b5666e --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23169.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23169", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:21.497", + "lastModified": "2025-06-19T00:15:21.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23170.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23170.json new file mode 100644 index 00000000000..cce2a6fb573 --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23170.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23170", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:21.620", + "lastModified": "2025-06-19T00:15:21.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526bc7dc94d6b9f2faf717", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23171.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23171.json new file mode 100644 index 00000000000..9e837d1ba64 --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23171.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23171", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:21.743", + "lastModified": "2025-06-19T00:15:21.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director SD-WAN orchestration platform provides an option to upload various types of files. The Versa Director does not correctly limit file upload permissions. The UI appears not to allow file uploads but uploads still succeed. In addition, the Versa Director discloses the full filename of uploaded temporary files, including the UUID prefix. Insecure UCPE image upload in Versa Director allows an authenticated attacker to upload a webshell. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526dbbdc94d6b9f2faf71a", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23172.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23172.json new file mode 100644 index 00000000000..c6e1f99debb --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23172.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23172", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:21.857", + "lastModified": "2025-06-19T00:15:21.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director SD-WAN orchestration platform includes a Webhook feature for sending notifications to external HTTP endpoints. However, the \"Add Webhook\" and \"Test Webhook\" functionalities can be abused by an authenticated user to send crafted HTTP requests to localhost. This can be leveraged to execute commands on behalf of the versa user, who has sudo privileges, potentially leading to privilege escalation or remote code execution. \r\n \r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526e7bdc94d6b9f2faf71b", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23173.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23173.json new file mode 100644 index 00000000000..e7c3e1843bc --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23173.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23173", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:21.977", + "lastModified": "2025-06-19T00:15:21.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nRestrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526ee0dc94d6b9f2faf71c", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24286.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24286.json new file mode 100644 index 00000000000..7d5f15b5b29 --- /dev/null +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24286.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-24286", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:22.093", + "lastModified": "2025-06-19T00:15:22.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.veeam.com/kb4743", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24287.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24287.json new file mode 100644 index 00000000000..eb8528a886a --- /dev/null +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24287.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-24287", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:22.207", + "lastModified": "2025-06-19T00:15:22.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.veeam.com/kb4743", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24288.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24288.json new file mode 100644 index 00000000000..86f33b659a1 --- /dev/null +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24288.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2025-24288", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:22.323", + "lastModified": "2025-06-19T00:15:22.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends the following security controls:\r\n\r\n1) Change default passwords to complex passwords\r\n2) Passwords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special character\r\n3) Passwords must be changed at least every 90 days\r\n4) Password change history is checked to ensure that the at least the last 5 passwords must be used when changing password.\r\n5) Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526d12dc94d6b9f2faf719", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24291.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24291.json new file mode 100644 index 00000000000..9403b5f0796 --- /dev/null +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24291.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24291", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-06-19T00:15:22.437", + "lastModified": "2025-06-19T00:15:22.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Versa Director SD-WAN orchestration platform provides functionality to upload various types of files. However, the Java code handling file uploads contains an argument injection vulnerability. By appending additional arguments to the file name, an attacker can bypass MIME type validation, allowing the upload of arbitrary file types. This flaw can be exploited to place a malicious file on disk. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://security-portal.versa-networks.com/emailbulletins/68526fc6dc94d6b9f2faf71d", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", + "source": "support@hackerone.com" + }, + { + "url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json index fe52ace241b..5bf82fdced9 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25580", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T15:16:00.123", - "lastModified": "2025-03-19T19:15:44.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:18:57.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.04", + "matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI6XT", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json index f9ee569310d..a14340d4b14 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25585", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T15:16:00.253", - "lastModified": "2025-03-19T19:15:45.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:16:52.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.04", + "matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7PG", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json index ae626a5ff2a..9a0411a0603 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25590", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-18T15:16:00.373", - "lastModified": "2025-03-19T19:15:45.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:17:23.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:r1bbit:yimioa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.07.04", + "matchCriteriaId": "12EE45D4-0E6C-44B0-8E4F-1B821044BB12" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json index 3f38a06e5cd..cf6ec022b43 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27913", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-10T20:15:14.500", - "lastModified": "2025-03-11T03:15:40.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:14:38.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:passbolt:passbolt_api:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0", + "matchCriteriaId": "B392CCF7-6685-4C9F-AD83-9D98B1D1625C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.passbolt.com/incidents/host-header-injection", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29058.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29058.json index 232ae2b8b88..44094d67934 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29058.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29058.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29058", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-18T21:15:43.843", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:24:18.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qimou_cms_project:qimou_cms:3.34.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B50095A0-C8D6-4504-8E83-ABB06128C792" + } + ] + } + ] + } + ], "references": [ { "url": "https://cdn.wjlin0.com/halo-img/74CMSv3.34.0%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.zip", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29339.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29339.json index 13803253e6d..61e0741a789 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29339.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29339.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29339", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-22T17:16:46.827", - "lastModified": "2025-04-23T14:15:28.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:23:24.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.7.2", + "matchCriteriaId": "E8160C0A-E77F-487D-B5E0-C6657E80D327" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/open5gs/open5gs/issues/3727", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32790.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32790.json index afbdb3a889f..d65280180f9 100644 --- a/CVE-2025/CVE-2025-327xx/CVE-2025-32790.json +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32790.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32790", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-18T13:15:58.177", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:36:04.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,69 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "0.6.13", + "matchCriteriaId": "DBA28F0B-2A55-4349-8728-2F6793E4295E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/langgenius/dify/commit/59ad091e69736bc9dc1a3bace62ec0a232346246", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/langgenius/dify/pull/5841", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory", + "Mitigation" + ] }, { "url": "https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory", + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32795.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32795.json index 17cc7fb84af..90e471f2f27 100644 --- a/CVE-2025/CVE-2025-327xx/CVE-2025-32795.json +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32795.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32795", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-18T16:15:23.627", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:25:59.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,20 +49,62 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "0.6.12", + "matchCriteriaId": "63A68C09-32F4-4AEE-B016-EFBAD72543EC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/langgenius/dify/pull/5266", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/langgenius/dify/security/advisories/GHSA-gg5w-m2vw-vmmj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory", + "Mitigation" + ] }, { "url": "https://github.com/langgenius/dify/security/advisories/GHSA-gg5w-m2vw-vmmj", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory", + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-446xx/CVE-2025-44612.json b/CVE-2025/CVE-2025-446xx/CVE-2025-44612.json index 5ff27edd77c..88469c0f423 100644 --- a/CVE-2025/CVE-2025-446xx/CVE-2025-44612.json +++ b/CVE-2025/CVE-2025-446xx/CVE-2025-44612.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44612", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-30T03:15:20.110", - "lastModified": "2025-05-30T22:15:22.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T01:08:28.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*", + "matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-446xx/CVE-2025-44614.json b/CVE-2025/CVE-2025-446xx/CVE-2025-44614.json index a72e1556a8c..238c2a4fd12 100644 --- a/CVE-2025/CVE-2025-446xx/CVE-2025-44614.json +++ b/CVE-2025/CVE-2025-446xx/CVE-2025-44614.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44614", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-30T03:15:20.573", - "lastModified": "2025-05-30T22:15:22.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T01:06:45.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*", + "matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-446xx/CVE-2025-44619.json b/CVE-2025/CVE-2025-446xx/CVE-2025-44619.json index 94c3fe8ccf4..1575eff3fc1 100644 --- a/CVE-2025/CVE-2025-446xx/CVE-2025-44619.json +++ b/CVE-2025/CVE-2025-446xx/CVE-2025-44619.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44619", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-30T03:15:20.737", - "lastModified": "2025-05-30T22:15:22.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T01:04:28.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tinxy:wifi_lock_controller_firmware:1:*:*:*:*:*:*:*", + "matchCriteriaId": "D5412F14-F539-403A-B269-AFCB5CC6A956" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tinxy:wifi_lock_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3D05B11-9932-4DD5-86C6-B66BA7D3949D" + } + ] + } + ] + } + ], "references": [ { "url": "http://tinxy.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://wifi.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-449xx/CVE-2025-44906.json b/CVE-2025/CVE-2025-449xx/CVE-2025-44906.json index 0de6eb44e5a..6bd26fb3371 100644 --- a/CVE-2025/CVE-2025-449xx/CVE-2025-44906.json +++ b/CVE-2025/CVE-2025-449xx/CVE-2025-44906.json @@ -2,8 +2,8 @@ "id": "CVE-2025-44906", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-30T04:15:46.583", - "lastModified": "2025-05-30T22:15:23.487", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:57:57.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jhead_project:jhead:3.08:*:*:*:*:*:*:*", + "matchCriteriaId": "E20ACC36-4896-4F01-B566-E37FC500A87C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-454xx/CVE-2025-45474.json b/CVE-2025/CVE-2025-454xx/CVE-2025-45474.json index 08377826ea8..ff94e2994d6 100644 --- a/CVE-2025/CVE-2025-454xx/CVE-2025-45474.json +++ b/CVE-2025/CVE-2025-454xx/CVE-2025-45474.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45474", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-29T16:15:40.143", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:45:23.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:maccms:maccms:10.0:2025.1000.4047:*:*:*:*:*:*", + "matchCriteriaId": "C5D75D35-F395-490F-8D42-D409A16FED9A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.yuque.com/morysummer/vx41bz/ptnnp4eema601rvz", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45878.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45878.json index 7557e2adc5c..3abc5996a0c 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45878.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45878.json @@ -2,13 +2,17 @@ "id": "CVE-2025-45878", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-17T17:15:33.487", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T01:16:08.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the report manager function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de administrador de informes de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado." } ], "metrics": { @@ -47,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.miliaris.it/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45879.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45879.json index 0acf228ab8a..e24d6696570 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45879.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45879.json @@ -2,13 +2,17 @@ "id": "CVE-2025-45879", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-17T16:15:32.730", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T01:17:35.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the e-mail manager function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de administrador de correo electr\u00f3nico de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado." } ], "metrics": { @@ -47,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.miliaris.it/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-458xx/CVE-2025-45880.json b/CVE-2025/CVE-2025-458xx/CVE-2025-45880.json index ba94ebf2466..e741427409f 100644 --- a/CVE-2025/CVE-2025-458xx/CVE-2025-45880.json +++ b/CVE-2025/CVE-2025-458xx/CVE-2025-45880.json @@ -2,13 +2,17 @@ "id": "CVE-2025-45880", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-17T17:15:33.603", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T01:14:25.967", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the data resource management function of Miliaris Amigdala v2.2.6 allows attackers to execute arbitrary HTML in the context of a user's browser via a crafted payload." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en la funci\u00f3n de gesti\u00f3n de recursos de datos de Miliaris Amigdala v2.2.6 permite a los atacantes ejecutar HTML arbitrario en el contexto del navegador de un usuario a trav\u00e9s de un payload manipulado." } ], "metrics": { @@ -47,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miliaris:amygdala:2.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0824F0-D832-4AE3-9CE0-4B3B344E9C6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.miliaris.it/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://xaliom.blogspot.com/2025/06/cve-2025-45878cve-2025-45879-and-cve.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47748.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47748.json index 5b8b047e732..f6711fcaf4b 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47748.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47748.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47748", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:27.307", - "lastModified": "2025-05-30T17:15:29.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:02:12.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0.0", + "versionEndExcluding": "11.1.25134.03", + "matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://netwrix.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48747.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48747.json index 283d846dd35..bac3bca83db 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48747.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48747.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48747", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:27.553", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:01:01.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0.0", + "versionEndExcluding": "11.1.25134.03", + "matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://netwrix.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-487xx/CVE-2025-48749.json b/CVE-2025/CVE-2025-487xx/CVE-2025-48749.json index 43879e4a6a8..ad843bb2f0a 100644 --- a/CVE-2025/CVE-2025-487xx/CVE-2025-48749.json +++ b/CVE-2025/CVE-2025-487xx/CVE-2025-48749.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48749", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-28T18:15:27.723", - "lastModified": "2025-05-29T14:29:50.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-18T23:59:44.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netwrix:directory_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0.0", + "versionEndExcluding": "11.1.25134.03", + "matchCriteriaId": "C8C200D2-C9DC-47E4-9DA9-C61B7E27C651" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://netwrix.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-488xx/CVE-2025-48887.json b/CVE-2025/CVE-2025-488xx/CVE-2025-48887.json index 76bd4602489..c334e6513bd 100644 --- a/CVE-2025/CVE-2025-488xx/CVE-2025-48887.json +++ b/CVE-2025/CVE-2025-488xx/CVE-2025-48887.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48887", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-30T18:15:32.500", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:55:27.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.6.4", + "versionEndExcluding": "0.9.0", + "matchCriteriaId": "18A93B72-AD3E-46D7-8948-E0765D4A7CB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vllm-project/vllm/commit/4fc1bf813ad80172c1db31264beaef7d93fe0601", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/vllm-project/vllm/pull/18454", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-501xx/CVE-2025-50181.json b/CVE-2025/CVE-2025-501xx/CVE-2025-50181.json new file mode 100644 index 00000000000..2977bc8190e --- /dev/null +++ b/CVE-2025/CVE-2025-501xx/CVE-2025-50181.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-50181", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-19T01:15:24.453", + "lastModified": "2025-06-19T01:15:24.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. This issue has been patched in version 2.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5136.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5136.json index 2b2b903100c..0120c76e977 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5136.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5136.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5136", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-25T00:15:23.043", - "lastModified": "2025-05-28T18:15:29.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-19T00:43:40.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,78 @@ "value": "CWE-330" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2025-05-05", + "matchCriteriaId": "7E13454D-93F2-4322-91A6-F4F365B6AA50" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/bdkuzma/vuln/issues/15", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.310215", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310215", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.571960", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/bdkuzma/vuln/issues/15", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-51xx/CVE-2025-5198.json b/CVE-2025/CVE-2025-51xx/CVE-2025-5198.json index 7b2d46de0be..9a50d2cac82 100644 --- a/CVE-2025/CVE-2025-51xx/CVE-2025-5198.json +++ b/CVE-2025/CVE-2025-51xx/CVE-2025-5198.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5198", "sourceIdentifier": "secalert@redhat.com", "published": "2025-05-27T21:15:22.863", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T00:08:12.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,18 +71,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:kubernates:*:*", + "matchCriteriaId": "0FB56EBE-BCC0-4833-82B3-D5EFC50A7E65" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stackrox:stackrox:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52EBFA77-3FF6-43EB-8606-C02D32796957" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2025-5198", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368568", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368568", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6007.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6007.json index 2f5e6b20943..1b95b2c7674 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6007.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6007.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6007", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-12T02:15:27.450", - "lastModified": "2025-06-12T16:06:20.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T01:26:45.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/adminnerr/cve/issues/8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.312330", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312330", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587569", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/adminnerr/cve/issues/8", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6008.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6008.json index 3323c97fc9b..5dbfd1d43ae 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6008.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6008.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6008", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-12T02:15:27.647", - "lastModified": "2025-06-12T16:06:20.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T01:26:01.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/adminnerr/cve/issues/9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.312331", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312331", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588088", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/adminnerr/cve/issues/9", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6009.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6009.json index f5713fa1836..78ea13b5cf3 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6009.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6009.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6009", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-12T03:15:26.440", - "lastModified": "2025-06-12T16:06:20.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T01:25:17.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kicode111:like-girl:5.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2948AA51-987D-477A-9CE2-0A4C4AF7A13C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/adminnerr/cve/issues/11", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.312332", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312332", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588092", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/adminnerr/cve/issues/11", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6151.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6151.json index 27606e42990..ec36878679d 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6151.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6151.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6151", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T01:15:23.313", - "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-19T01:20:04.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,32 +122,96 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2492A6CA-DFF1-42DC-8800-4A66D8943C33" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:*", + "matchCriteriaId": "2537DC7E-8024-45B5-924C-18C9B702DAFC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/WhereisDoujo/CVE/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.312626", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.312626", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.593031", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tp-link.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/WhereisDoujo/CVE/issues/7", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index abfc1168c5e..40100eddf24 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-18T23:55:19.662525+00:00 +2025-06-19T02:00:19.760458+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-18T23:39:55.290000+00:00 +2025-06-19T01:26:45.850000+00:00 ``` ### Last Data Feed Release @@ -27,35 +27,63 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-06-18T00:00:04.338437+00:00 +2025-06-19T00:00:04.325476+00:00 ``` ### Total Number of included CVEs ```plain -298668 +298681 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `13` -- [CVE-2025-49590](CVE-2025/CVE-2025-495xx/CVE-2025-49590.json) (`2025-06-18T23:15:19.200`) -- [CVE-2025-49591](CVE-2025/CVE-2025-495xx/CVE-2025-49591.json) (`2025-06-18T23:15:19.403`) +- [CVE-2024-45208](CVE-2024/CVE-2024-452xx/CVE-2024-45208.json) (`2025-06-19T00:15:21.097`) +- [CVE-2025-23121](CVE-2025/CVE-2025-231xx/CVE-2025-23121.json) (`2025-06-19T00:15:21.260`) +- [CVE-2025-23168](CVE-2025/CVE-2025-231xx/CVE-2025-23168.json) (`2025-06-19T00:15:21.377`) +- [CVE-2025-23169](CVE-2025/CVE-2025-231xx/CVE-2025-23169.json) (`2025-06-19T00:15:21.497`) +- [CVE-2025-23170](CVE-2025/CVE-2025-231xx/CVE-2025-23170.json) (`2025-06-19T00:15:21.620`) +- [CVE-2025-23171](CVE-2025/CVE-2025-231xx/CVE-2025-23171.json) (`2025-06-19T00:15:21.743`) +- [CVE-2025-23172](CVE-2025/CVE-2025-231xx/CVE-2025-23172.json) (`2025-06-19T00:15:21.857`) +- [CVE-2025-23173](CVE-2025/CVE-2025-231xx/CVE-2025-23173.json) (`2025-06-19T00:15:21.977`) +- [CVE-2025-24286](CVE-2025/CVE-2025-242xx/CVE-2025-24286.json) (`2025-06-19T00:15:22.093`) +- [CVE-2025-24287](CVE-2025/CVE-2025-242xx/CVE-2025-24287.json) (`2025-06-19T00:15:22.207`) +- [CVE-2025-24288](CVE-2025/CVE-2025-242xx/CVE-2025-24288.json) (`2025-06-19T00:15:22.323`) +- [CVE-2025-24291](CVE-2025/CVE-2025-242xx/CVE-2025-24291.json) (`2025-06-19T00:15:22.437`) +- [CVE-2025-50181](CVE-2025/CVE-2025-501xx/CVE-2025-50181.json) (`2025-06-19T01:15:24.453`) ### CVEs modified in the last Commit -Recently modified CVEs: `8` +Recently modified CVEs: `30` -- [CVE-2023-25718](CVE-2023/CVE-2023-257xx/CVE-2023-25718.json) (`2025-06-18T22:15:31.953`) -- [CVE-2023-25719](CVE-2023/CVE-2023-257xx/CVE-2023-25719.json) (`2025-06-18T22:15:32.900`) -- [CVE-2024-45673](CVE-2024/CVE-2024-456xx/CVE-2024-45673.json) (`2025-06-18T23:36:20.167`) -- [CVE-2024-53011](CVE-2024/CVE-2024-530xx/CVE-2024-53011.json) (`2025-06-18T23:27:51.907`) -- [CVE-2024-54961](CVE-2024/CVE-2024-549xx/CVE-2024-54961.json) (`2025-06-18T23:39:55.290`) -- [CVE-2025-1403](CVE-2025/CVE-2025-14xx/CVE-2025-1403.json) (`2025-06-18T23:34:56.550`) -- [CVE-2025-22973](CVE-2025/CVE-2025-229xx/CVE-2025-22973.json) (`2025-06-18T23:38:27.877`) -- [CVE-2025-3509](CVE-2025/CVE-2025-35xx/CVE-2025-3509.json) (`2025-06-18T22:15:33.197`) +- [CVE-2025-25585](CVE-2025/CVE-2025-255xx/CVE-2025-25585.json) (`2025-06-19T00:16:52.923`) +- [CVE-2025-25590](CVE-2025/CVE-2025-255xx/CVE-2025-25590.json) (`2025-06-19T00:17:23.083`) +- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-06-19T00:14:38.870`) +- [CVE-2025-29058](CVE-2025/CVE-2025-290xx/CVE-2025-29058.json) (`2025-06-19T00:24:18.037`) +- [CVE-2025-29339](CVE-2025/CVE-2025-293xx/CVE-2025-29339.json) (`2025-06-19T00:23:24.013`) +- [CVE-2025-32790](CVE-2025/CVE-2025-327xx/CVE-2025-32790.json) (`2025-06-19T00:36:04.717`) +- [CVE-2025-32795](CVE-2025/CVE-2025-327xx/CVE-2025-32795.json) (`2025-06-19T00:25:59.333`) +- [CVE-2025-44612](CVE-2025/CVE-2025-446xx/CVE-2025-44612.json) (`2025-06-19T01:08:28.777`) +- [CVE-2025-44614](CVE-2025/CVE-2025-446xx/CVE-2025-44614.json) (`2025-06-19T01:06:45.603`) +- [CVE-2025-44619](CVE-2025/CVE-2025-446xx/CVE-2025-44619.json) (`2025-06-19T01:04:28.143`) +- [CVE-2025-44906](CVE-2025/CVE-2025-449xx/CVE-2025-44906.json) (`2025-06-19T00:57:57.120`) +- [CVE-2025-45474](CVE-2025/CVE-2025-454xx/CVE-2025-45474.json) (`2025-06-19T00:45:23.457`) +- [CVE-2025-45878](CVE-2025/CVE-2025-458xx/CVE-2025-45878.json) (`2025-06-19T01:16:08.927`) +- [CVE-2025-45879](CVE-2025/CVE-2025-458xx/CVE-2025-45879.json) (`2025-06-19T01:17:35.180`) +- [CVE-2025-45880](CVE-2025/CVE-2025-458xx/CVE-2025-45880.json) (`2025-06-19T01:14:25.967`) +- [CVE-2025-47748](CVE-2025/CVE-2025-477xx/CVE-2025-47748.json) (`2025-06-19T00:02:12.070`) +- [CVE-2025-48747](CVE-2025/CVE-2025-487xx/CVE-2025-48747.json) (`2025-06-19T00:01:01.873`) +- [CVE-2025-48749](CVE-2025/CVE-2025-487xx/CVE-2025-48749.json) (`2025-06-18T23:59:44.600`) +- [CVE-2025-48887](CVE-2025/CVE-2025-488xx/CVE-2025-48887.json) (`2025-06-19T00:55:27.710`) +- [CVE-2025-5136](CVE-2025/CVE-2025-51xx/CVE-2025-5136.json) (`2025-06-19T00:43:40.970`) +- [CVE-2025-5198](CVE-2025/CVE-2025-51xx/CVE-2025-5198.json) (`2025-06-19T00:08:12.993`) +- [CVE-2025-6007](CVE-2025/CVE-2025-60xx/CVE-2025-6007.json) (`2025-06-19T01:26:45.850`) +- [CVE-2025-6008](CVE-2025/CVE-2025-60xx/CVE-2025-6008.json) (`2025-06-19T01:26:01.867`) +- [CVE-2025-6009](CVE-2025/CVE-2025-60xx/CVE-2025-6009.json) (`2025-06-19T01:25:17.743`) +- [CVE-2025-6151](CVE-2025/CVE-2025-61xx/CVE-2025-6151.json) (`2025-06-19T01:20:04.247`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f2782c97d0b..ae5d5af3c21 100644 --- a/_state.csv +++ b/_state.csv @@ -209743,7 +209743,7 @@ CVE-2022-4383,0,0,4f3978e4f233cbb9ea3de8a171f30bbfb0c78ab6638a66a4ebf99903af67e7 CVE-2022-43830,0,0,2f64150b363b8e69222f4767b2a962c4259c9aa91848800fda8ecd6f999d6183,2023-11-15T07:15:14.527000 CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000 CVE-2022-4384,0,0,e4a42500f1faf0f01c4bfb043390142606fdcf1d1d2db89407d32200252c33e2,2025-03-25T21:15:38.660000 -CVE-2022-43840,0,0,17b6a4cb24007ec977e60889a6e08821bcc6c5745ad3e4daae541616660c9c28,2025-04-15T21:15:46.440000 +CVE-2022-43840,0,1,94f74eda1ab8e287091221f74a3441f77946bbe7ffdb7fa0120169fed7356996,2025-06-19T00:37:04.670000 CVE-2022-43841,0,0,6dac3a6012885404339a039f533cfe4b8c4ab64fc90a590d1b6f4c9d270c1163,2025-01-08T17:13:14.077000 CVE-2022-43842,0,0,968543d78d4d0106d71002238fd33b4337c8761617723fc4383d8ec785dd2e77,2024-12-31T15:32:22.737000 CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000 @@ -221427,8 +221427,8 @@ CVE-2023-25714,0,0,30d1b3b8c2658a5d809246d435c81ddf2f9287a1f5b188d50271eb4a0e433 CVE-2023-25715,0,0,6d88ef667b64c52873b9245db5fa7fe78e16f2c79bc517d1f15a2686934c9956,2024-11-21T07:49:59.500000 CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000 CVE-2023-25717,0,0,7ab45047ae291b9110620bf824e69b193b7f478cc5e4114d5ea36a12a4b0fe42,2025-03-10T20:48:20.863000 -CVE-2023-25718,0,1,cc8356e68a532592d775c24c87006dd197f0d5fa235dcf5d5a5430114eb11a09,2025-06-18T22:15:31.953000 -CVE-2023-25719,0,1,fc4f39771edda78244556047b067a46288412298b1ca6924e0ff9d3be74cad0f,2025-06-18T22:15:32.900000 +CVE-2023-25718,0,0,cc8356e68a532592d775c24c87006dd197f0d5fa235dcf5d5a5430114eb11a09,2025-06-18T22:15:31.953000 +CVE-2023-25719,0,0,fc4f39771edda78244556047b067a46288412298b1ca6924e0ff9d3be74cad0f,2025-06-18T22:15:32.900000 CVE-2023-2572,0,0,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000 CVE-2023-25721,0,0,f81320c364560d2364a1f3ba19d0330f029ea11a50a94d0f9f6b4ead68d21d31,2025-02-19T19:15:13.430000 CVE-2023-25722,0,0,bca76e3911d579e248d877cdd35275de0ae46411c20589fc7ce57e1a3e928a08,2025-02-19T19:15:13.617000 @@ -235144,7 +235144,7 @@ CVE-2023-43043,0,0,4ec93aa82436dc86b4ccb1b3684f50d48aedc5bdc1d93f254412bd4b2a651 CVE-2023-43044,0,0,c700e000c93a60d18aeeabd55f0025926f6f0c9fba18f1ec754ac13e08b3d371,2024-11-21T08:23:38.910000 CVE-2023-43045,0,0,692f22dbc4dc19c089253751109b93bb0e5cefd8359cd7675e66e51e06c8d3dd,2024-11-21T08:23:39.040000 CVE-2023-43051,0,0,ed0b2315886b0d02ae69e50125a4e57219197c24e1340da2f4eb30f9896d5010,2024-12-17T18:08:08.027000 -CVE-2023-43052,0,0,30b38e81f9b68b808f2a57887d47632e125fae6e9f8c3bc0081997acf157dbbd,2025-03-07T17:15:18.060000 +CVE-2023-43052,0,1,34d91346bfa0dfc2c1a10c99807c82304103db8d4169e79a7cb7e17472e40ad3,2025-06-19T00:11:36.133000 CVE-2023-43054,0,0,160b9682e5bec73380f263a77e3ebbeba23b48fbec834d03025c28d701ba1820,2024-12-23T17:29:02.930000 CVE-2023-43057,0,0,01fddeae7f9538027c931e3e992d44ad1edd38b1d8fac1c202a9cab42dc2359d,2024-11-21T08:23:39.433000 CVE-2023-43058,0,0,a2df93f61b20e82bd3917a094411dc8a8f78a1f838adb628292a86116ce01de3,2024-11-21T08:23:39.570000 @@ -236235,7 +236235,7 @@ CVE-2023-4474,0,0,d4799a0dcb39156734a25b4a28a5bb799b18044cdd0ae6f04e22995d42ec8e CVE-2023-4475,0,0,47d15833d3ca73c79ddd2d5025af5599df0f7e6c16d19dfe77959aa4b1c5b183,2024-11-21T08:35:14.783000 CVE-2023-44752,0,0,4150e5669753eb509a1cbbef3d32df8ffde74678268a185e96d344d83a0d7b56,2025-04-24T14:56:07.597000 CVE-2023-44753,0,0,7f15867a32c11b9d1f1f543f8bcefd4ddc6bed14590816ea3bb45fb1470f0c42,2025-04-24T14:56:59.410000 -CVE-2023-44755,0,0,92d10d0b12020aa13ca2aaede57a9d65cd4656558ec8de3c717fbbcdbcb38a22,2025-04-23T14:15:27.320000 +CVE-2023-44755,0,1,d4cf51af7796cac9fa9b6347172c9e7e4d9beb9283ba7a52b125bc35dc0bc41e,2025-06-19T00:21:38.390000 CVE-2023-44758,0,0,e729895caf9bb37b37c8201b6a85dd648d3aa9d89e2cb2d0d6a653b2301b177c,2024-11-21T08:26:00.480000 CVE-2023-4476,0,0,bf61db59ad9dafdf3e6ed235511e570fb7d4b9651b983b2ad75bb82e45001399,2025-04-23T17:16:44.590000 CVE-2023-44760,0,0,8a6af57f009c485579afa393ac6a3871eb0427a7d2f884cbbc517eacf7222787,2024-11-21T08:26:00.630000 @@ -252351,7 +252351,7 @@ CVE-2024-22647,0,0,0ff7eb4dbd9389ed33bcf5e48fde75377e1d805c7a4011b4189cfb80cc3dc CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69b0c,2024-11-21T08:56:32.420000 CVE-2024-2265,0,0,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000 CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000 -CVE-2024-22653,0,0,84ea78d231e683750b79b93a6446704614ee3cab07a58cf58e432565337cb4f0,2025-05-30T16:31:03.107000 +CVE-2024-22653,0,1,9327c4eeb2944373f4b4615e203889d4d97ef3692e8a64646c097e9e2e698468,2025-06-18T23:57:03.917000 CVE-2024-22654,0,0,7f401d524d432dc6daf2737f2dfd50a846877c5557a2b4e454e64bca9bc199f3,2025-05-30T16:31:03.107000 CVE-2024-2266,0,0,95d5ae8a3d9367be388b5604e19ba904305ae510fd4151f2cfa0ff7fb43bf84e,2025-03-11T16:53:46.840000 CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000 @@ -269703,6 +269703,7 @@ CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff6 CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000 CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000 CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000 +CVE-2024-45208,1,1,7215a369507849f231782490b34d0cc67523c6bd551d9fefc6a31e8c75e86c05,2025-06-19T00:15:21.097000 CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000 CVE-2024-45216,0,0,0c858a01ee35c91ac1e5a46b34b1bd78a3671b8c7c394b48bf0907856ecc77c6,2024-11-21T09:37:28.690000 CVE-2024-45217,0,0,6810c24892f2494e2f2c08a71fcaf1b8b72831c7bb6f78dcca7b6cc985b451a7,2024-11-21T09:37:28.897000 @@ -270108,7 +270109,7 @@ CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b6 CVE-2024-4567,0,0,f9422c43c79efa82ea99c9dec60f6662a26312cd8fd4cf90d580aef590f63be3,2025-03-07T12:37:30.023000 CVE-2024-45670,0,0,884f280837c803b089861d2cd0800b5b952f4567c75753b35001e2a46ace7ee6,2024-11-16T00:24:57.203000 CVE-2024-45672,0,0,1f284c4606417b08ac2cd87243460783df32e665537ee9aa04c2649281078873,2025-01-23T18:15:30.057000 -CVE-2024-45673,0,1,29f2d7c32b4c17ca5b5341d16e6030d5c7734db3da16c157ef02bea198990643,2025-06-18T23:36:20.167000 +CVE-2024-45673,0,0,29f2d7c32b4c17ca5b5341d16e6030d5c7734db3da16c157ef02bea198990643,2025-06-18T23:36:20.167000 CVE-2024-45674,0,0,5a8f07a024d33c4f56bbf8876244f6e043fca60be2177c862fb1271be54ef76b,2025-02-22T00:15:18.410000 CVE-2024-45676,0,0,eb22d41374a33aad487840972b05f99b6866c07ad3faeb5bebf20d811966d571,2024-12-11T03:21:10.387000 CVE-2024-45678,0,0,c75108ce7d77ba88a074d8ae6e0835493f724a0bc9c0b841e9bb922f4030ac54,2025-03-17T18:15:18.033000 @@ -275504,7 +275505,7 @@ CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000 CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000 CVE-2024-53010,0,0,e92ea489ea86ddb06142add3a7b47a2b4c77fd3f05e7b1a7bf67e9e564744128,2025-06-04T14:54:33.783000 -CVE-2024-53011,0,1,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000 +CVE-2024-53011,0,0,9f543daf6d1032b8c529ba0691f6774574470a7477d429016cd467649e59ce57,2025-06-18T23:27:51.907000 CVE-2024-53012,0,0,950d19974b52359043aeababc59a313e37e644d350cda3a38725dd1bbdedcdb2,2025-03-06T17:11:00.953000 CVE-2024-53013,0,0,8d210c05dd1b64c6c47cfd00c65a0b73f17272a696913a123b948752a0ecd543,2025-06-04T14:54:33.783000 CVE-2024-53014,0,0,f46cf9621d7ec0ec27b269342393212a2ff98a2d1e4dee51da1f5926fb7a1566,2025-03-06T17:53:56.627000 @@ -276908,7 +276909,7 @@ CVE-2024-54958,0,0,05aa071d04d451a63fdeb28f8fd1c549b9935b77ac20404b5acdb6c9e76ec CVE-2024-54959,0,0,d1f45eb8b3595354ce21bb15fb93c0707cc7f656ec9206940bec23d402effbf4,2025-02-21T22:15:12.593000 CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 CVE-2024-54960,0,0,8d367a9174beb59a3f0e906c9cbe8173c7e94403da4b6d1b3ef81ffe768eea4c,2025-02-20T20:15:45.927000 -CVE-2024-54961,0,1,d01efa3a725b7b071feaa9038a3d2e643299d5c9a69e4d407f43d6af709bc320,2025-06-18T23:39:55.290000 +CVE-2024-54961,0,0,d01efa3a725b7b071feaa9038a3d2e643299d5c9a69e4d407f43d6af709bc320,2025-06-18T23:39:55.290000 CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000 CVE-2024-54982,0,0,f9ebf7280811fe14b802aa42d21c7712849d65d0c4fab1838b9c1493b6720970,2025-01-16T21:15:16.320000 @@ -283840,7 +283841,7 @@ CVE-2025-1399,0,0,e8485dd7af68ba8f2d01d51196b9d6a2f2dcf208ff563be9860baa305f6daa CVE-2025-1400,0,0,9f46a0258b2b238aeafb292dde4996586d32ba094d532a39f75891a9cb5fcf1e,2025-05-07T14:13:20.483000 CVE-2025-1401,0,0,133011ee6945168c3da00a99f9ab3febf4bfdf6bf9088c02ff1a91a5995f2e5b,2025-04-29T14:33:03.920000 CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000 -CVE-2025-1403,0,1,c40087b1d9b18cf6d2fd48f22d1a8ca09df0153a80f3a47bf1e1d9b76fc33bdc,2025-06-18T23:34:56.550000 +CVE-2025-1403,0,0,c40087b1d9b18cf6d2fd48f22d1a8ca09df0153a80f3a47bf1e1d9b76fc33bdc,2025-06-18T23:34:56.550000 CVE-2025-1404,0,0,f39be30144b0a5fe80b4b94433169bbe79b568debe0e45a11fa0a8302ed0e64e,2025-03-01T12:15:34.310000 CVE-2025-1405,0,0,9d1939e7603fe8cd2a4a6b659e6149cd03308d08f69102d0905681145b4d879a,2025-03-06T17:57:54.597000 CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000 @@ -286560,7 +286561,7 @@ CVE-2025-22962,0,0,773f9192cf586f9a26d3c9055927917c829f6abfc86fb569ec71975a3edac CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000 CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000 CVE-2025-22968,0,0,d0a75ffad23d4bf4fd1a2a7bd701b07084101823bc6e94fd7915fe64c67cfcd2,2025-05-21T16:21:44.280000 -CVE-2025-22973,0,1,ac6664ff93ee8bd28667fc4c4cb52a67fbb351c8a7bd7808b2174e7353b88f37,2025-06-18T23:38:27.877000 +CVE-2025-22973,0,0,ac6664ff93ee8bd28667fc4c4cb52a67fbb351c8a7bd7808b2174e7353b88f37,2025-06-18T23:38:27.877000 CVE-2025-22974,0,0,4185e79accf61de6fccd04dc583797f701c7a7868c89a08c56fe419709f832c0,2025-03-25T16:36:17.127000 CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000 CVE-2025-22978,0,0,a869979eb8846d055e51d4b0332046ec3bb48e7e906c85c4b44b4a923b3dfc63,2025-05-13T19:34:04.030000 @@ -286679,6 +286680,7 @@ CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8 CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000 CVE-2025-2312,0,0,9414b11cccd912a93c7b77b8b8a4cccf6c204bd0063ade57fb6afec180d8cd63,2025-03-27T16:45:46.410000 CVE-2025-23120,0,0,fcc412fa6fb516a26fbcce2f3fd613ece130eab1dda24987978f45ecc9becda2,2025-04-02T16:01:20.857000 +CVE-2025-23121,1,1,c86b05491865e4836bf6329c1e162cbd30a6a1a5c9be4521f81e5cc797e8b1c6,2025-06-19T00:15:21.260000 CVE-2025-23122,0,0,f8c01c8ef5b6f9e831cc1568dda7fdd2cbff2f2dc9b80c6b770cbbbb7df7e604,2025-05-20T22:15:18.907000 CVE-2025-23123,0,0,d28e8b5e29fa7054d5082b2ec0990e478426188aacd81179d6ef03e17b2813d9,2025-05-19T14:15:22.560000 CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 @@ -286726,7 +286728,13 @@ CVE-2025-23164,0,0,d6c71aadf409109dde414ece9e46d71250f8539b53bfd49135d9534a66c81 CVE-2025-23165,0,0,a3f5779be4e59c9a66a594d6c3ca801baf089a9d49144b143211178cc604b18d,2025-05-19T14:15:22.683000 CVE-2025-23166,0,0,47816fc5591e3a4414111fd69de9efb4cbf6aca82919721dea5adc3261322e9d,2025-05-19T15:15:23.310000 CVE-2025-23167,0,0,51e20beaaef964a23d54b2f922e381e06cac714eb024305c1bced81671d165c1,2025-05-19T16:15:27.317000 +CVE-2025-23168,1,1,546ed7c64bc03ea0d51fecc396d56c188ec7f68a49c7ea532db1eaf3e684366b,2025-06-19T00:15:21.377000 +CVE-2025-23169,1,1,e6f8ba47a6606d785ba012a980755371860a8b07baaaed5333bdd4dff9994ab6,2025-06-19T00:15:21.497000 CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000 +CVE-2025-23170,1,1,435072620bb9f6e2323acf1b32f92f05d9f6176513f869147cabcbc7416369e7,2025-06-19T00:15:21.620000 +CVE-2025-23171,1,1,93cd0060572ed22af88863bbc002e2eae1bda0f6be8c43e073a24b943a764b61,2025-06-19T00:15:21.743000 +CVE-2025-23172,1,1,08d066df5e2545e2c4980c7a00113f81e9955fbf9898af9917452768c0c042ca,2025-06-19T00:15:21.857000 +CVE-2025-23173,1,1,46be7eeb11c19f13fd500aa3ff85203ba69130d74a0bd93b54ea0e84e022ac91,2025-06-19T00:15:21.977000 CVE-2025-23174,0,0,50322119595bff087a12ed6f94f87f583ba40060fccb96eb5cf9c3f3476fa552,2025-04-23T14:08:13.383000 CVE-2025-23175,0,0,d32116b600ac178b1ee720078d8acfc21dc4298d12982e92ae53dd00f4271286,2025-04-23T14:08:13.383000 CVE-2025-23176,0,0,4d8a569d7f8b232199b1ed07a8ee3ee2f1c9e25ade11e06e887257dda42b67cb,2025-04-23T14:08:13.383000 @@ -287746,6 +287754,10 @@ CVE-2025-24280,0,0,7e6318ddeec3c45683c18b4a04b0c338f2389b9346d93c786d9c6752b668d CVE-2025-24281,0,0,76b9011c7783c871ef865a80caf1ae08e485f8d8810428515769f6f44737d638,2025-04-04T18:22:19.983000 CVE-2025-24282,0,0,92059d5a241b5d96ef7593ded7e2abc281079ec5ed3a524fa050c614e5194214,2025-04-04T18:23:23.340000 CVE-2025-24283,0,0,4df1743210499b8e21375ec5fdb7750825951563a76a92a49e54d06df67345b4,2025-04-07T14:07:33.510000 +CVE-2025-24286,1,1,65683583000d5529830b20ccff957add7c317eaf54ac1796bbc7a2c77fe87db0,2025-06-19T00:15:22.093000 +CVE-2025-24287,1,1,e41d94977fd890910d04b473f5243ba60c7263c3bad06c2e597f78ea0eb5c900,2025-06-19T00:15:22.207000 +CVE-2025-24288,1,1,2a83985293da967adc6016271e645505f2b1fe813d876cc179a7cddf121b081a,2025-06-19T00:15:22.323000 +CVE-2025-24291,1,1,af1e02cc91c468c4c3b8047dcc990ef7498963d0fe709481ee27332ceda5885a,2025-06-19T00:15:22.437000 CVE-2025-24297,0,0,5d4a74f3648dba475a9505a338d2107001df4a92611f1e742f9c3b8bc6fc9e4e,2025-04-16T13:25:37.340000 CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000 CVE-2025-24304,0,0,d93e512a7b4aa7125a9d9a3a56f58a274a5675b50a430e59bfee24f84fb92162,2025-04-07T14:17:50.220000 @@ -288696,13 +288708,13 @@ CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d8692650 CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 CVE-2025-25579,0,0,9ad1112c1ed3d836da183b36b2d4375f4736b0d6d1110b2bc10e441acd9590d4,2025-04-07T14:23:36.660000 CVE-2025-2558,0,0,f54caa5596788d78e4aadac9170f01e05efbd611d3891eab20a89c4ada7faf76,2025-04-29T13:52:47.470000 -CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000 +CVE-2025-25580,0,1,a7fce7289773d49e23ea5e84e7bf568aff3d97944f32e02e6812a51089903564,2025-06-19T00:18:57.017000 CVE-2025-25582,0,0,fdff5f005418e70695619b15a5365b87844b6870f1b28eb8b42a995086eb8722,2025-04-02T12:27:19.593000 -CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000 +CVE-2025-25585,0,1,98a50572e811d5f13ce801a89eed6933c5c3cc3522affcd97ffbbab7b5092abc,2025-06-19T00:16:52.923000 CVE-2025-25586,0,0,9d3dab1f0ca9edbc0b6ffff21562595a974056df41184e0c163d1dfe65d9c443,2025-04-01T20:38:38.617000 CVE-2025-25589,0,0,279eb4ff22a60008293d709d8e850b13874c50e8c6f1e23d8361c430349b0055,2025-03-21T14:15:16.007000 CVE-2025-2559,0,0,e0a1ec52fcee197642d94bd63e1278a00066cfd7daa56d8679b3fb30d47c24ac,2025-04-30T03:15:17.857000 -CVE-2025-25590,0,0,3893b0a4da36be48d36967b7837bf6fae4ec31547efd1c3211b9404b64ed4014,2025-03-19T19:15:45.640000 +CVE-2025-25590,0,1,96d0d533d8a4dfebea4ec0eedd66c24e0734a94d85635e359915a361c424dc59,2025-06-19T00:17:23.083000 CVE-2025-25595,0,0,fed1db19038d4b73f5895de99c0193dd0437928c86ea4f6762661a5574f5f9ac,2025-04-01T20:38:28.603000 CVE-2025-25598,0,0,97b7c491c3636dfe02438cb323583c05678dcf453afda217f0aaabb9e8d0908a,2025-04-03T16:36:30.420000 CVE-2025-2560,0,0,337093de562c8838404064a49d62d16ccb57a1ba560038dbcd17a316d2777179,2025-06-17T21:07:40.473000 @@ -290181,7 +290193,7 @@ CVE-2025-27907,0,0,9272c9f0f3ebf450826a7c5ed13cb42593f690c62fd733f0bb0016d57e6b9 CVE-2025-27910,0,0,507628b1591b753da54c96355e4029096a0435f13a8b9964d15ae69d34924cd4,2025-05-21T19:34:30.897000 CVE-2025-27911,0,0,10e67228aa90db73c3414ce28096a25aef6cbc3f128533308c9edad1912d6fdb,2025-03-11T08:15:11.500000 CVE-2025-27912,0,0,607ba6a16d641d751b5df959275fc938490ced30d4e8e005bbdc21ac77f4d97c,2025-03-11T08:15:11.727000 -CVE-2025-27913,0,0,f2177e7fabb09419b96c97469c2fe9aa09d8b825af754be72e4ea907f64e0e7c,2025-03-11T03:15:40.027000 +CVE-2025-27913,0,1,485fe06bc425120126a2274ee10ae796cc1723ddd3b39b8ce670ae2e45be546c,2025-06-19T00:14:38.870000 CVE-2025-27914,0,0,f279e908e73009eab2977a1f24fd2dfdc09b80866f9164398ffd96fb6fa013f7,2025-04-02T20:38:06.430000 CVE-2025-27915,0,0,cd099995dd55d9bf47b9910748dbe833f7620d7232f17e750972cd85ba2bccbf,2025-04-02T20:38:25.487000 CVE-2025-27920,0,0,860eecbf3eb49dc71aa68177ecb3d2f8f87bd3bfcb02e4d5ca70f91c6686bc79,2025-05-21T19:40:21.300000 @@ -290549,7 +290561,7 @@ CVE-2025-29046,0,0,97c704d53eaab90ebd050fb706002e2d0c0d26d31e8336e6914769a779ce7 CVE-2025-29047,0,0,ab9e56c52d1b5d7ce28982f238deab131b797a6e3c2a7fe7bd1afe31cde47f19,2025-04-30T15:32:30.690000 CVE-2025-29049,0,0,5d330c70d7d31103316e937aa271bd3496ea507fadb908ea97bf504a0ca30485,2025-04-02T14:58:07.527000 CVE-2025-2905,0,0,4e658b40e4673325cad88f5d27301325c733ab3811bf1fdb2bfe5209f1723eaf,2025-05-05T20:54:19.760000 -CVE-2025-29058,0,0,7bc50f4cade840847079528b991d483c5848c526d0c824da3719f4b63ecc56c6,2025-04-21T14:23:45.950000 +CVE-2025-29058,0,1,8fd36d2b37519c6477eceb6d49c53ef292a2d14ab64b3e3ae3de289581e5f825,2025-06-19T00:24:18.037000 CVE-2025-2906,0,0,a9a7d8b41557888835e1c79dd2617916cc6b4f3c0d6d09861e305343a3b52d6a,2025-04-01T20:26:11.547000 CVE-2025-29062,0,0,cf634246124158ff6da279c0a25858fa36e0953ce98966a9f38c5cffd84c104e,2025-04-29T13:42:54.483000 CVE-2025-29063,0,0,53319713162795fa5af1bba6f6ae7ca1ca4961c65f7a40b22ba40193b32d5e1f,2025-04-29T13:38:03.320000 @@ -290624,7 +290636,7 @@ CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccb CVE-2025-29316,0,0,edbfef5d2b6ba20f5ddacf4404f4ebf4c89ebe5fca32750f4069bf616e710afc,2025-05-05T18:15:41.723000 CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000 CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000 -CVE-2025-29339,0,0,68a305eeb644847bf32dd93a9ea14694595bad06f76ea0ff7f59df135eb9dae8,2025-04-23T14:15:28.957000 +CVE-2025-29339,0,1,3c8767e6fc1c7537f5abbed85f26508361863e04ceb6434ef3e14faf20c7a82c,2025-06-19T00:23:24.013000 CVE-2025-2935,0,0,7b37cfe809822a560bb0e6dbeb565e9e50c614feb77ac7a6501335760c490b55,2025-06-06T14:07:28.330000 CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000 CVE-2025-29358,0,0,610f6132677edbf66dfcad4906cefbaf7edab86ba5e1c4ae5ea8eda11e0df66d,2025-04-02T20:33:25.387000 @@ -293277,12 +293289,12 @@ CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd CVE-2025-32787,0,0,8a246667f42b8c93bdf6ea46fc5b0e98103cc9f313dbb1cf2d73b44e0183e974,2025-04-17T20:21:48.243000 CVE-2025-32788,0,0,cebc5cd0039e46d666bc72b974aa2129ecda5527e4c21f72222322773942a165,2025-04-23T14:08:13.383000 CVE-2025-32789,0,0,15497d5966ffa6957462c2b50b8826e589c0a55241d8772e97d18438454b376f,2025-06-18T13:08:03.067000 -CVE-2025-32790,0,0,990684714275a758b4cf34a8ac7b4f82fc1b2c4e46163c9e33e822bd80e8f1a8,2025-04-21T14:23:45.950000 +CVE-2025-32790,0,1,ad704aba084f587745e00b79fe34454c0424370ee4217d2aeeeb26c85bddfc96,2025-06-19T00:36:04.717000 CVE-2025-32791,0,0,7bfb43a10b9eb50667be3773a3b4fe4844fac126ca4c8485005211a087def8c1,2025-04-17T20:21:48.243000 CVE-2025-32792,0,0,5617465372754753e6f838bd9a5e8e1789ad8b344ec076ba7e3dadb68ae93bcb,2025-04-21T14:23:45.950000 CVE-2025-32793,0,0,53c512d5ca796aaa2074213fb6811f42fd2ddcbb1551cf07ba87dac176a68735,2025-04-23T14:08:13.383000 CVE-2025-32794,0,0,e5c75374c7acd23f4b7bf6398c0b16e7126deed02aabe7e5caf26f8df1848b02,2025-05-28T14:58:52.920000 -CVE-2025-32795,0,0,9b91f12206c53caef7f7087deba98182feb5bc18c57224b5893c030b3a403c24,2025-04-21T14:23:45.950000 +CVE-2025-32795,0,1,3226787ef9fde307f13d92b52c13368891b70059c6d43e363196d275603a2be2,2025-06-19T00:25:59.333000 CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000 CVE-2025-32797,0,0,39a1453b6f2631a027a7807128ca6c2891d742d8758fbedb098024372cb946b4,2025-06-17T20:50:23.507000 CVE-2025-32798,0,0,f44833545ee36efc429fe65c06380ddfd5e2af6021ad43cc23f550f5437de549,2025-06-17T20:50:23.507000 @@ -293696,7 +293708,7 @@ CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905 CVE-2025-35036,0,0,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000 CVE-2025-3504,0,0,aa0bdb842e6d15cc15443745349224911fa493d95241cc6b8918b52272013f3a,2025-05-07T16:30:38.630000 CVE-2025-3506,0,0,2cb7dd6bbf56ec7a1271ba0855665acb3addde320f586d229e2ed1fc18ebe38d,2025-05-08T14:39:09.683000 -CVE-2025-3509,0,1,59dfeef049b50d7f8ac0a0fdc9ad111deee128bea1190de29b989508fce45039,2025-06-18T22:15:33.197000 +CVE-2025-3509,0,0,59dfeef049b50d7f8ac0a0fdc9ad111deee128bea1190de29b989508fce45039,2025-06-18T22:15:33.197000 CVE-2025-3510,0,0,1b8ed8f812be63691dac933113d2a261e9d649bd0a63b491c4d9db6c3ce2c4a2,2025-05-06T15:19:30.527000 CVE-2025-3511,0,0,2581a75036be8d737bc9c5afcbd1a9fd25ea23392ab1ff727e244646bbc80fb2,2025-04-29T13:52:28.490000 CVE-2025-3512,0,0,20d5b7a0c651482d59ceef752919a6e419c7dc684bf79b235343ded68357dd77,2025-04-25T18:15:26.103000 @@ -295497,9 +295509,9 @@ CVE-2025-4458,0,0,eea9d140dad4a90fff730d46462b27320b6a68017f06012fa50cfa447315cc CVE-2025-4459,0,0,5d83ffa5e1366542181e5e41a54bfeb484e13bea3e368fac332c6a4e14d2429f,2025-05-16T15:36:12.370000 CVE-2025-4460,0,0,1523c53b4c3872072d748d30b69d698f488cc9e2a4c6bd053b5055199ec1d6eb,2025-05-23T12:28:39.320000 CVE-2025-4461,0,0,3bcbf8140bfe36150100ec64813a63556401d9c6c9569195ed4770cdd149bae8,2025-05-23T12:33:21.447000 -CVE-2025-44612,0,0,ab31165040d4e1acf62342650f5a81fcd3d1ed85f65ea951c1762f491a626de7,2025-05-30T22:15:22.617000 -CVE-2025-44614,0,0,2b0e5eb52856556d366041a820729a8d2c7d10ce2788b493796bef3738a63138,2025-05-30T22:15:22.790000 -CVE-2025-44619,0,0,2e5472ba4d6ea57e021067b24b93cef81ddd7248b90b1c18bf27182d915cf485,2025-05-30T22:15:22.967000 +CVE-2025-44612,0,1,5defe95505c6700db90200d792442f785e503a45c3ea11c6229ec62aecfa8dd5,2025-06-19T01:08:28.777000 +CVE-2025-44614,0,1,0f68dc5a3d03479a4187b8785f635a99a89cffec91a8b63dbc057ac34a947962,2025-06-19T01:06:45.603000 +CVE-2025-44619,0,1,422a72a04b94879413276ec6eb0213f1193ef9eb8b1372f7221aa0e31c9fe170,2025-06-19T01:04:28.143000 CVE-2025-4462,0,0,a45c74043d407d51bd153a59310148483accce910ccf874e95fb20ccf665af48,2025-05-23T12:37:15.720000 CVE-2025-4463,0,0,9e877456add3b215f52a45038f40c9086cab0011383eb94f398b692bd4cf9448,2025-05-16T15:36:03.983000 CVE-2025-4464,0,0,43a4f1f30e275a5908987f511806e5bef7544ddf882b5a452ef3e2c803ed00cc,2025-05-16T15:35:56.983000 @@ -295579,7 +295591,7 @@ CVE-2025-4490,0,0,241f08f705ae3e66d0cf435e9f641db9abaac260a233ab4f24995312c1bd33 CVE-2025-44900,0,0,715b90a244faa6f40eccc3c1fc10f72c265ad47c8a18532c8f483a83d8dfdf3b,2025-06-04T17:25:54.930000 CVE-2025-44904,0,0,698017dffc9baafe7f90678fc77c6bf37e6dde2be1b0112d7bbe4b0cba948021,2025-06-03T15:35:50.377000 CVE-2025-44905,0,0,55f5d849eeb5a9403dc8d40445e406a7d903c79ed83689e9e12fa9fbbf4ce28a,2025-06-03T15:35:40.283000 -CVE-2025-44906,0,0,282d55acfc77538b313708459953bbd20cbde03a419a436e303d61c1ed0e76dd,2025-05-30T22:15:23.487000 +CVE-2025-44906,0,1,8c35bb41ab99832e2381732b703a4e95fba657841fb0a7405fdc1c5ff67eb038,2025-06-19T00:57:57.120000 CVE-2025-4491,0,0,ba256d8517f70212e591537769bd709f798dda4e9421bc8dc0e19810c50211c2,2025-05-13T18:57:25.977000 CVE-2025-4492,0,0,4eec4ffb9ff09b31eb69062234f9086984737bbfc848cc0a9df2b8747073742a,2025-05-13T18:57:16.670000 CVE-2025-4493,0,0,68c76c6c662ffa6d0b165fd473ec10bcb58eca28ca884631899ab57537d7fbf7,2025-05-28T15:01:30.720000 @@ -295668,7 +295680,7 @@ CVE-2025-45468,0,0,1f9ca402c698f9398e2cfc09460d45546d3a5c4644d69b2590973d05b1fe6 CVE-2025-4547,0,0,5a9f97c59a5517a42eb37b2bfaeb218892d8ce2e6447168e1978702b9836490b,2025-05-16T17:19:47.520000 CVE-2025-45471,0,0,175cebfb698d65801503c809b3aa892182068d5ca8c7cb75b47dca0205a19e21,2025-05-23T15:55:02.040000 CVE-2025-45472,0,0,2637a833bc8f30b44e037d16794888343f063d186f0716a0b1631b9011f38122,2025-05-23T16:15:25.777000 -CVE-2025-45474,0,0,15c71faa487e912137cb6dd8291dff7f6e8ac2a114c512a23cbcfed4253fa37e,2025-05-30T16:31:03.107000 +CVE-2025-45474,0,1,5a86947a5dcb30409703950db611fb972ad2af49b62606364ea6d0524ca2d928,2025-06-19T00:45:23.457000 CVE-2025-45475,0,0,c651c3ca7b70bd6e8fa8fbb78ede99da7981aaa6c45716e37e6135c5fa59a413,2025-05-29T19:15:27.790000 CVE-2025-4548,0,0,a8fe2cea464a0b35dbac9350217055ae490f25b77738ddb03311a9902dfffcb3,2025-05-13T18:55:54.360000 CVE-2025-45487,0,0,ffb60bfe346afcb15249da2528ccd12c910ff9915205c63e38aaf38509c65e39,2025-05-13T20:19:05.490000 @@ -295764,9 +295776,9 @@ CVE-2025-45864,0,0,b32f79c80f948a5502c692222ba63db7db0d85fc0944e6f9a68e63f94b3a1 CVE-2025-45865,0,0,367062564ab2fabd14817d58b3e7095878e7c26afaa0eb1dd77e8dfb0a65054e,2025-05-15T18:37:31.917000 CVE-2025-45866,0,0,48c16ba2c1a450558a2d650800240d515297efe6c8338a7502e000a11c7cf020,2025-06-17T19:39:56.640000 CVE-2025-45867,0,0,a78de81cad59bbc316e2ff4eacf13da0ca81d5efbf89eb838fbfcc576cba1eb1,2025-06-17T19:39:47.240000 -CVE-2025-45878,0,0,62b94a39a151ab6e7c549c2c16947ad4227e454bb47e8f58a3b24b8380fc5307,2025-06-17T20:50:23.507000 -CVE-2025-45879,0,0,b379e9eb0b5b34ad9aef750a6bedc6898f7516a414ea0451183ba6c225d00aaa,2025-06-17T20:50:23.507000 -CVE-2025-45880,0,0,44f30fcb46473facac91e9a76b1d275d248138cc58976639930bfa745e54aa8d,2025-06-17T20:50:23.507000 +CVE-2025-45878,0,1,6b615553fc01027582e83444469fbebd12926b528a6fd0f4487cffdba07fc964,2025-06-19T01:16:08.927000 +CVE-2025-45879,0,1,a523ea1be4f66a907ee86b9ebd07662f0a00641a69e4600b6fb7654b16a506de,2025-06-19T01:17:35.180000 +CVE-2025-45880,0,1,c47ab1f65c4156b5c6429c22b5f9bfbbc63b3cc275dd1d042554312bbfc017be,2025-06-19T01:14:25.967000 CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000 CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000 CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000 @@ -296861,7 +296873,7 @@ CVE-2025-47735,0,0,2f52e7c2d058d86629cac68f734c0774cf880fe4e8f98eedcaeede1d23aa6 CVE-2025-47736,0,0,2f11e9b0a9d748da2f6ce9c62d30862cdd6596c7ac96ac5f1028db67479c00c6,2025-05-12T17:32:52.810000 CVE-2025-47737,0,0,60cb12bc89ce6f2a8fe9e7af3463c6e9c2bcca5ef96322a90d7cccb126b389d1,2025-05-12T17:32:52.810000 CVE-2025-4774,0,0,030f0c165972a90f2efc4aaa5ddbfe19e3d1b1c3af0f3137283b01a5858b493d,2025-06-12T16:06:39.330000 -CVE-2025-47748,0,0,b90bacb2c6f839ee321be88774b4833cef222cda69ff8602ec8ddb9f1d835f3e,2025-05-30T17:15:29.117000 +CVE-2025-47748,0,1,e91bacbbf68ff936e9ffc4e2dc9102ab0bec0b3e3b7394e08f7d2f364041349e,2025-06-19T00:02:12.070000 CVE-2025-47749,0,0,77136f5a200eae36103a9c78079b2abf4fa9dbee2a99746a355de3498002722c,2025-05-19T17:30:06.440000 CVE-2025-4775,0,0,0fad29bd3e9858145fb455ae58be296c8d3a170752ce945a7dd422f11e7d0b15,2025-06-17T20:50:23.507000 CVE-2025-47750,0,0,1a4ff5a2f7fb0cd15d257d686f97e3b073753ad3ba8037a1d7327a6c86b11820,2025-05-19T17:31:27.667000 @@ -297305,9 +297317,9 @@ CVE-2025-48743,0,0,c91acb6150f07a43c974b698b48df19455694c9a8c5f37e0bbd5aa9b807fb CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8955,2025-06-09T18:50:58.620000 CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000 CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000 -CVE-2025-48747,0,0,15faa5990b14fe28d9e9adffb09c889e29a458d2860986cf684ebec4ab0b970b,2025-05-29T14:29:50.247000 +CVE-2025-48747,0,1,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000 CVE-2025-48748,0,0,b7307577dff3e5ce645bd5ba057a9ae096f6a95ae5b6b2f453f6bbe07920f1f1,2025-05-30T16:31:03.107000 -CVE-2025-48749,0,0,00f7b9bcd1525e342ee0659152f079b4a6dcc45883d33ce6a8b1423f085fa8c2,2025-05-29T14:29:50.247000 +CVE-2025-48749,0,1,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000 CVE-2025-4875,0,0,130bc5da676a7028541a0b0fca1ba41a63baeb979bb88a491f60fd8b45c2548f,2025-05-21T19:39:23.917000 CVE-2025-48751,0,0,7b48afa401b2b93b58deb3a57cdb6356d07d3afa8b095b572a5b480362f21209,2025-05-28T14:58:52.920000 CVE-2025-48752,0,0,417f08c4a3fc844a1f6adee231658d0c60eb0b6a83e7d60fcf34a66c6755f30e,2025-05-28T14:58:52.920000 @@ -297370,7 +297382,7 @@ CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe CVE-2025-48882,0,0,0675a44f5475635d3b90df25f21b843f71a594f25b60ebf1257710a520ba2459,2025-06-02T17:32:17.397000 CVE-2025-48883,0,0,14507842d3e0b613f4c9b8d62ad8df05d93e1c97510cf43e163a8411a419850f,2025-06-02T17:32:17.397000 CVE-2025-48885,0,0,a22cad12e847f8e3d6cac2d0c207ccbc3235380976544a38095804a3e40d9d2f,2025-06-02T17:32:17.397000 -CVE-2025-48887,0,0,1d5cacac7d4463b079037d15dea05f85b4e0e8b7d35792f7788c0510a474c648,2025-06-02T17:32:17.397000 +CVE-2025-48887,0,1,d715c137954000dfa4d0fdb3ecdb8e16b928f4dac02dc271a6a5d4052e6a12f9,2025-06-19T00:55:27.710000 CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44ccf65,2025-06-05T20:12:23.777000 CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000 CVE-2025-4889,0,0,01c7a8037082d88b5ac656519933c8c5460517579f14e0273e6b2875f7942bab,2025-05-28T15:30:05.053000 @@ -297731,8 +297743,8 @@ CVE-2025-49585,0,0,5bf4c40d67475101b94bdc46e2d5692603da18c9e7df40708e6ea162e9f61 CVE-2025-49586,0,0,2c3a3ffb465e48b26eb6217846164f4f9a6ce07e373f9efa6cf1228016e4468b,2025-06-16T12:32:18.840000 CVE-2025-49587,0,0,de5086ac381fd168ddf890ff4b6777f5711fd665730c37d4ee199139f966ae7d,2025-06-16T12:32:18.840000 CVE-2025-49589,0,0,4de9f02dd34b97b034101bec18a9814c3229a0f8edc0cf289468099913dab0e8,2025-06-16T12:32:18.840000 -CVE-2025-49590,1,1,d02c6f68b2408b9164502691436e2ff7dad8a8a8a34be335d4ee052b1ca56b13,2025-06-18T23:15:19.200000 -CVE-2025-49591,1,1,28f6d3018b9734805a1499f3feb0c242fc3749eb3d800735b2df7e9e13d4e56e,2025-06-18T23:15:19.403000 +CVE-2025-49590,0,0,d02c6f68b2408b9164502691436e2ff7dad8a8a8a34be335d4ee052b1ca56b13,2025-06-18T23:15:19.200000 +CVE-2025-49591,0,0,28f6d3018b9734805a1499f3feb0c242fc3749eb3d800735b2df7e9e13d4e56e,2025-06-18T23:15:19.403000 CVE-2025-49593,0,0,6d7381d4ff0f4b81807be7ac3e78832aa1c2958239dda39de56e3e5b443b96da,2025-06-18T13:46:52.973000 CVE-2025-49596,0,0,914f35572c3497727ef5bfdff2cd9e17d27812703e06d7a6c3496156238c7e41,2025-06-16T12:32:18.840000 CVE-2025-49597,0,0,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000 @@ -297845,6 +297857,7 @@ CVE-2025-50149,0,0,e01be1ba294ecdeaf476ba9bb17e64b1284ce9362fb5da1703e5c224f2a89 CVE-2025-50150,0,0,79eb21a64f645c369296b1d0b905e35268f567b5a96dfbfc58ef963e4e69507b,2025-06-14T03:15:22.220000 CVE-2025-5016,0,0,d907c2ff3d5c65fe44aee01e8b0e3594629d2dcb543e14c1a3c5bbcba44c8083,2025-06-02T17:32:17.397000 CVE-2025-5018,0,0,e6074d13c744f0bbc4fedce0adf645747389e40f5acdd13f0492e74df313cc90,2025-06-06T14:07:28.330000 +CVE-2025-50181,1,1,c3850146c5a0b14f2cce48561569b8a28f7456fb311da59cb44a38aa4cc7c715,2025-06-19T01:15:24.453000 CVE-2025-5019,0,0,9e77689bce77b4f77cc10eef8ecd39dc784fee948cba6d9ab205fa6a8f33f986,2025-06-06T14:07:28.330000 CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245ee,2025-06-13T18:55:32.903000 CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000 @@ -297918,7 +297931,7 @@ CVE-2025-5132,0,0,92567ff3cb96caac4b2a7f5afbc84b272b06854c208c48821c8e814d8a244d CVE-2025-5133,0,0,71ff685cb41d220918422266a9a9027a78bee24552031db902c458276c3d0621,2025-06-03T15:48:15.610000 CVE-2025-5134,0,0,d420ea46d85516af4902b09065e0670f0f7a966eecf320488abdd86a620ad3ac,2025-06-03T15:48:28.580000 CVE-2025-5135,0,0,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c456,2025-06-03T15:48:40.953000 -CVE-2025-5136,0,0,bd0c27de50ee06fcb71ffb69b26d594d7fa702a9a559c430c5d629f3be8d9822,2025-05-28T18:15:29.530000 +CVE-2025-5136,0,1,6b76178b393ce786e02c90a2baf18e1605a6560667c6c5172f14e227aef611af,2025-06-19T00:43:40.970000 CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000 CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000 CVE-2025-51381,0,0,90017ba2f2fd86cff636ae17c3c22e5ea0f00724f257397ca0c300a57129132c,2025-06-18T13:46:52.973000 @@ -297973,7 +297986,7 @@ CVE-2025-5190,0,0,b83fcbe64867ed5f66064afe0985f0f8e1099ccb823b90fa56196e26e3f4bf CVE-2025-5192,0,0,60cab63e53de16bf0d2b760f814c5b69c2d153aa1edfa79d1c5ac599f5bf94f5,2025-06-06T14:07:28.330000 CVE-2025-5195,0,0,67ed4f2b8401a12100a4ab10d4477eb555cb25ae77229fa0c172cda09b715498,2025-06-12T16:06:20.180000 CVE-2025-5196,0,0,e0938db7c97745bb3f3070e04c267d2314060f49f00cd38492cd5b468ae94740,2025-05-28T18:15:33.670000 -CVE-2025-5198,0,0,81bd13d2a866ca7de4c3f2f26760c3d14afdd9d115b50ea3fd55967b3466e3f8,2025-05-28T15:01:30.720000 +CVE-2025-5198,0,1,c8124bf615d24cf9474c96b9bd6d16252727b696641a4975ae527719f7fa40f3,2025-06-19T00:08:12.993000 CVE-2025-5200,0,0,740d1c6af0ac032e5f77add784768d5ba871f8a7dc1be1d8555505f3ed6440d1,2025-06-05T14:17:19.607000 CVE-2025-5201,0,0,b4028548330d8a4402ec1f2305222f13a42431f4d6fce12a8c6845a20f9892aa,2025-06-05T14:16:26.557000 CVE-2025-5202,0,0,a5576375be538fa454feccc29b5d9756f262d32c77920b2b2fcc080fafd9eb39,2025-06-05T14:16:16.410000 @@ -298551,9 +298564,9 @@ CVE-2025-6002,0,0,c3342aafede1398b2d7e7cc8f4c9f889ab7afc3c4ac6360898dd2f7299f1fe CVE-2025-6003,0,0,13a477a4b87366b3fef1966498d6d8c821ce2e26bf2366c0e56fb46b20ebdcb5,2025-06-12T16:06:20.180000 CVE-2025-6005,0,0,2cf44564776f402947a17c91be3717b20ba7071fdb538dc73eff857dfd935e96,2025-06-12T16:06:20.180000 CVE-2025-6006,0,0,f3890d678b52a65bb188746bd2b72b04830e80f4fcc6e370b4f5f482a5c89435,2025-06-12T16:06:20.180000 -CVE-2025-6007,0,0,0a6b30e00b610d68c64f9ae664f6748f210976b9ca69a527a02472b830ffa838,2025-06-12T16:06:20.180000 -CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f94481,2025-06-12T16:06:20.180000 -CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000 +CVE-2025-6007,0,1,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399f2,2025-06-19T01:26:45.850000 +CVE-2025-6008,0,1,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000 +CVE-2025-6009,0,1,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 @@ -298638,7 +298651,7 @@ CVE-2025-6147,0,0,570ac2a48926a6ca3fbbf19843b6ed5165fc288ba0666045a4c3539c09fd13 CVE-2025-6148,0,0,ea54d2ee97b05bc473f95b428c1e5203650c95ed69365a87af6ed86096e7cac1,2025-06-17T20:50:23.507000 CVE-2025-6149,0,0,7c17b71b2470ad9456e79bc76a0e10dbfa869b397a8c16a012013222daafab86,2025-06-17T20:50:23.507000 CVE-2025-6150,0,0,7824049227e4d181411b19e48dd725520b624c26d17cf96197a1635eeeb0b9a5,2025-06-17T20:50:23.507000 -CVE-2025-6151,0,0,aa4fa0a465e1acec8ecc150b0738a8690a097c49434164f17226e1edc7c55015,2025-06-17T20:50:23.507000 +CVE-2025-6151,0,1,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000 CVE-2025-6152,0,0,ff4ccaf39bf818abdc375e234ccbed4be33d2e886689e2e8335c122e3871c2eb,2025-06-17T20:50:23.507000 CVE-2025-6153,0,0,2fc60dca756ddc4e172d6897384ac8518a5ff1f5174120a3dcec13ba5207b272,2025-06-17T20:50:23.507000 CVE-2025-6154,0,0,f1415c5a2eb0eacb2f774f7a7fb86d492db28bb7f75636c28658e54eafbc0f4f,2025-06-17T20:50:23.507000