Auto-Update: 2025-06-09T20:00:19.599263+00:00

This commit is contained in:
cad-safe-bot 2025-06-09 20:03:56 +00:00
parent 9c246c77af
commit 8dac63d24c
146 changed files with 7409 additions and 935 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41953",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-09T14:15:08.710",
"lastModified": "2024-12-09T14:15:08.710",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:29:02.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-user-avatar/vulnerability/wordpress-profilepress-plugin-4-13-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.13.2",
"matchCriteriaId": "EA7A6C96-3C3A-47BD-A4CA-78D686509C1B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-user-avatar/vulnerability/wordpress-profilepress-plugin-4-13-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48774",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-09T13:15:33.937",
"lastModified": "2024-12-09T13:15:33.937",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:22:58.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ideapush/vulnerability/wordpress-ideapush-plugin-8-53-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:northernbeacheswebsites:ideapush:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.58",
"matchCriteriaId": "349E73F5-6A90-443F-B108-CBC178F8C876"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ideapush/vulnerability/wordpress-ideapush-plugin-8-53-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49835",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-09T13:15:36.733",
"lastModified": "2024-12-09T13:15:36.733",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:23:43.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-31-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metaphorcreations:post_duplicator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.32",
"matchCriteriaId": "9EB828FC-CA5C-430D-B023-8D905B202F3D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-31-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50082",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-04T08:15:08.993",
"lastModified": "2024-11-21T08:36:31.107",
"lastModified": "2025-06-09T18:15:23.050",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50882",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-09T13:15:38.720",
"lastModified": "2024-12-09T13:15:38.720",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:28:15.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-user-avatar/vulnerability/wordpress-profilepress-plugin-4-13-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.13.3",
"matchCriteriaId": "F655930E-1F4F-48AE-B39F-11CBF939F817"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-user-avatar/vulnerability/wordpress-profilepress-plugin-4-13-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51210",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T19:15:08.230",
"lastModified": "2024-11-21T08:37:54.773",
"lastModified": "2025-06-09T19:15:22.553",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7168",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:30.120",
"lastModified": "2025-05-20T15:16:00.430",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:54:07.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/715ded45-04ee-40c1-8acb-bd40d0fe30ec/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/715ded45-04ee-40c1-8acb-bd40d0fe30ec/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:antonpug:better_flow_button_for_jetpack:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "8.0",
"matchCriteriaId": "2725FE3D-E0DF-4515-B8A4-AC19FA8C5C3B"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/715ded45-04ee-40c1-8acb-bd40d0fe30ec/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/715ded45-04ee-40c1-8acb-bd40d0fe30ec/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7239",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:30.920",
"lastModified": "2025-05-16T17:15:49.190",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:31:08.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/6e6afe50-27f9-41fa-a94b-f44df0850e2c/",
"source": "contact@wpscan.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jeroensormani:wp_dashboard_notes:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.11",
"matchCriteriaId": "4503DC31-C24B-4A80-A58A-4F6E28CF5FEB"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/6e6afe50-27f9-41fa-a94b-f44df0850e2c/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7297",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:31.007",
"lastModified": "2025-05-16T17:15:49.340",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:29:35.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/3632dfa1-2948-4622-a8fd-31edb8b22383/",
"source": "contact@wpscan.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reneade:twitterposts:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.2",
"matchCriteriaId": "9729E6F4-715F-4107-94FA-42CC6DD61C64"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/3632dfa1-2948-4622-a8fd-31edb8b22383/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0249",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:31.090",
"lastModified": "2025-05-16T17:15:49.497",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:28:56.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/e7ee3e73-1086-421f-b586-d415a45a6c8e/",
"source": "contact@wpscan.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hijiriworld:advanced_schedule_posts:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.8",
"matchCriteriaId": "B59B7AC2-FD82-4C4C-B8A7-009EFA93BDD1"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e7ee3e73-1086-421f-b586-d415a45a6c8e/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0589",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-01-31T13:15:10.567",
"lastModified": "2024-11-21T08:46:57.360",
"lastModified": "2025-06-09T19:15:23.393",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0970",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:32.200",
"lastModified": "2025-05-16T17:15:49.807",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:24:48.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/7df6877c-6640-41be-aacb-20c7da61e4db/",
"source": "contact@wpscan.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mooveagency:user_activity_tracking_and_log:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.1.4",
"matchCriteriaId": "40EFB2E7-BE3F-40D9-AFC7-DF48EE5F3FD8"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7df6877c-6640-41be-aacb-20c7da61e4db/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10098",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:32.620",
"lastModified": "2025-05-20T16:15:24.010",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:23:28.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/242dac1f-9a1f-4fde-b8c7-374bd451071d/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/242dac1f-9a1f-4fde-b8c7-374bd451071d/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:spiderteams:applyonline_-_application_form_builder_and_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.3",
"matchCriteriaId": "B9D0FFE7-0C88-47E9-95CC-C96CA189D45C"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/242dac1f-9a1f-4fde-b8c7-374bd451071d/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/242dac1f-9a1f-4fde-b8c7-374bd451071d/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10149",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:33.037",
"lastModified": "2025-05-20T16:15:24.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:20:18.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/1619dc4b-4e5e-4b82-820b-3c4e732db3ad/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/1619dc4b-4e5e-4b82-820b-3c4e732db3ad/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cm-wp:social_slider_widget:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.9",
"matchCriteriaId": "282EF2D0-EB5F-42E8-958E-FA885329DD75"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/1619dc4b-4e5e-4b82-820b-3c4e732db3ad/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/1619dc4b-4e5e-4b82-820b-3c4e732db3ad/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10362",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:33.120",
"lastModified": "2025-05-20T20:15:27.700",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:18:46.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/701f653b-a0c3-49b4-972e-f26c3633ad92/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/701f653b-a0c3-49b4-972e-f26c3633ad92/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:inisev:social_media_share_buttons_\\&_social_sharing_icons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.9.1",
"matchCriteriaId": "D263A05F-9BFE-4577-AAF9-F6CA71217803"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/701f653b-a0c3-49b4-972e-f26c3633ad92/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/701f653b-a0c3-49b4-972e-f26c3633ad92/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10475",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:33.207",
"lastModified": "2025-05-20T20:15:27.857",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:17:46.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/faca59fb-6b59-45b0-8b97-c4125d9d3cb3/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/faca59fb-6b59-45b0-8b97-c4125d9d3cb3/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themehunk:contact_form_\\&_lead_form_elementor_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.9.8",
"matchCriteriaId": "6EF48C59-DEDC-4685-AEA2-0542B8742120"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/faca59fb-6b59-45b0-8b97-c4125d9d3cb3/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/faca59fb-6b59-45b0-8b97-c4125d9d3cb3/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10631",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:33.380",
"lastModified": "2025-05-20T16:15:24.960",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:11:29.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/b153fb5e-7df2-491b-b61b-6f90314c7b04/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/b153fb5e-7df2-491b-b61b-6f90314c7b04/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flickdevs:countdown_timer_for_wordpress_block_editor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.5",
"matchCriteriaId": "F7A4D390-73CD-4137-8AE1-761C316CB662"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/b153fb5e-7df2-491b-b61b-6f90314c7b04/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/b153fb5e-7df2-491b-b61b-6f90314c7b04/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10632",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:33.460",
"lastModified": "2025-05-20T20:15:28.010",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:10:20.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/17afba70-f213-47f6-aea2-59288ca92549/",
"source": "contact@wpscan.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nokautpl:nokaut_offers_box:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.0",
"matchCriteriaId": "8DF02E58-E9D9-4F3D-BB1E-F446D17B4DAF"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/17afba70-f213-47f6-aea2-59288ca92549/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10634",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:33.543",
"lastModified": "2025-05-20T20:15:28.323",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:09:43.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/97de2ca3-ee64-480b-a5b0-7549533c2936/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/97de2ca3-ee64-480b-a5b0-7549533c2936/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nokautpl:nokaut_offers_box:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.0",
"matchCriteriaId": "8DF02E58-E9D9-4F3D-BB1E-F446D17B4DAF"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/97de2ca3-ee64-480b-a5b0-7549533c2936/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/97de2ca3-ee64-480b-a5b0-7549533c2936/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11140",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:33.970",
"lastModified": "2025-05-20T16:15:25.250",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:08:23.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/b3448dff-a839-45aa-8d5a-d359e50ab7fd/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/b3448dff-a839-45aa-8d5a-d359e50ab7fd/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vk011:real_wp_shop_lite_ajax_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.8",
"matchCriteriaId": "484E4788-49D9-4970-BC48-94A30EDC58E6"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/b3448dff-a839-45aa-8d5a-d359e50ab7fd/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/b3448dff-a839-45aa-8d5a-d359e50ab7fd/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11189",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:34.140",
"lastModified": "2025-05-20T20:15:29.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:53:11.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/f3d1473a-6d25-447d-af27-f315323fdd62/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/f3d1473a-6d25-447d-af27-f315323fdd62/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reputeinfosystems:social_share_and_social_locker:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.2",
"matchCriteriaId": "E4E3A8F0-CF8D-42F2-BEB1-8AE69919E63D"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/f3d1473a-6d25-447d-af27-f315323fdd62/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/f3d1473a-6d25-447d-af27-f315323fdd62/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11372",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:35.013",
"lastModified": "2025-05-20T20:15:29.857",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:51:54.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/de74199a-001e-4388-82ae-70cfd5a49457/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/de74199a-001e-4388-82ae-70cfd5a49457/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:floriansimunek:connexion_logs:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.0.2",
"matchCriteriaId": "A96CF14D-40E8-4FDF-9B31-13E493358FD0"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/de74199a-001e-4388-82ae-70cfd5a49457/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/de74199a-001e-4388-82ae-70cfd5a49457/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11373",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:35.193",
"lastModified": "2025-05-20T20:15:29.993",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:51:30.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/e9ef847f-3a3f-4030-828b-78db0044e142/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/e9ef847f-3a3f-4030-828b-78db0044e142/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:floriansimunek:connexion_logs:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.0.2",
"matchCriteriaId": "A96CF14D-40E8-4FDF-9B31-13E493358FD0"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e9ef847f-3a3f-4030-828b-78db0044e142/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/e9ef847f-3a3f-4030-828b-78db0044e142/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11502",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:35.337",
"lastModified": "2025-05-20T20:15:30.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-09T18:49:53.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/d9bea52e-af32-449f-97b6-1dcfb2051bda/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/d9bea52e-af32-449f-97b6-1dcfb2051bda/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpchurchteam:planning_center_online_giving:1.0.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "8B100963-6A81-487B-A8C3-FB465345BFE7"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/d9bea52e-af32-449f-97b6-1dcfb2051bda/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/d9bea52e-af32-449f-97b6-1dcfb2051bda/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11718",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:35.480",
"lastModified": "2025-05-20T20:15:30.280",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-09T18:47:33.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/02da3a49-20e4-4476-a78d-4c627994a90a/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/02da3a49-20e4-4476-a78d-4c627994a90a/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:couleurcitron:tarteaucitron-wp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "0.3.0",
"matchCriteriaId": "001D5883-16E1-4241-A549-ABD0B739CAAA"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/02da3a49-20e4-4476-a78d-4c627994a90a/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/02da3a49-20e4-4476-a78d-4c627994a90a/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11719",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:35.577",
"lastModified": "2025-05-20T20:15:30.420",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-09T18:44:47.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/64c2a296-5fc6-450e-a12d-75cbf8b73e3a/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/64c2a296-5fc6-450e-a12d-75cbf8b73e3a/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:couleurcitron:tarteaucitron-wp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "0.3.0",
"matchCriteriaId": "001D5883-16E1-4241-A549-ABD0B739CAAA"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/64c2a296-5fc6-450e-a12d-75cbf8b73e3a/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/64c2a296-5fc6-450e-a12d-75cbf8b73e3a/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11843",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:35.660",
"lastModified": "2025-05-20T20:15:30.560",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-09T18:43:44.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/0dd41559-d88a-4018-a0f0-c8944b6d6f0a/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/0dd41559-d88a-4018-a0f0-c8944b6d6f0a/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectpanorama:panorama:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.5.1",
"matchCriteriaId": "D37E8514-92F3-4238-974B-7288CA514F36"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/0dd41559-d88a-4018-a0f0-c8944b6d6f0a/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/0dd41559-d88a-4018-a0f0-c8944b6d6f0a/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12282",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:35.740",
"lastModified": "2025-05-20T20:15:30.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-09T18:41:15.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/2d81f038-e2bb-4906-a954-78dc971ed793/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/2d81f038-e2bb-4906-a954-78dc971ed793/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smyx:wp-connect:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.5.6",
"matchCriteriaId": "98DC3BAA-D609-45D0-9684-0BDB93C48B22"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/2d81f038-e2bb-4906-a954-78dc971ed793/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/2d81f038-e2bb-4906-a954-78dc971ed793/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12301",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:35.837",
"lastModified": "2025-05-20T20:15:30.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-09T18:42:17.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/5d93db07-415f-475b-a76d-2e12f849a4dc/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/5d93db07-415f-475b-a76d-2e12f849a4dc/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomlaserviceprovider:jsp_store_locator:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "751745B9-D321-4FA9-AF57-F555723FBBFA"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/5d93db07-415f-475b-a76d-2e12f849a4dc/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/5d93db07-415f-475b-a76d-2e12f849a4dc/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12750",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:37.090",
"lastModified": "2025-05-20T20:15:32.760",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-09T18:57:14.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/f3570bdc-659f-4a03-96f8-b4f9f045f910/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/f3570bdc-659f-4a03-96f8-b4f9f045f910/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:raiserweb:competition_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.0",
"matchCriteriaId": "8525BEF0-62E6-4E6C-8FE8-AFBD37F95972"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/f3570bdc-659f-4a03-96f8-b4f9f045f910/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/f3570bdc-659f-4a03-96f8-b4f9f045f910/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12873",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-05-15T20:15:37.850",
"lastModified": "2025-05-20T19:15:48.787",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:57:23.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/3e82d45f-7b8f-424e-a8d7-be64f5acf65e/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/3e82d45f-7b8f-424e-a8d7-be64f5acf65e/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f1logic:custom_field_manager:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "492EBE87-843E-4D18-9359-28EE4371B6AF"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/3e82d45f-7b8f-424e-a8d7-be64f5acf65e/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/3e82d45f-7b8f-424e-a8d7-be64f5acf65e/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22860",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-27T06:15:48.430",
"lastModified": "2024-11-21T08:56:43.380",
"lastModified": "2025-06-09T19:15:23.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22876",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-19T14:15:13.510",
"lastModified": "2024-11-21T08:56:44.390",
"lastModified": "2025-06-09T18:15:24.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24330",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-30T15:15:09.597",
"lastModified": "2024-11-21T08:59:11.363",
"lastModified": "2025-06-09T19:15:23.907",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38341",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T16:15:32.847",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:57:54.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,12 +69,58 @@
"value": "CWE-328"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0.0",
"versionEndIncluding": "6.0.3.1",
"matchCriteriaId": "4C123481-383C-4001-B5DB-C0A31D48EDEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.0.0",
"versionEndIncluding": "6.1.0.1",
"matchCriteriaId": "CE4CE662-8122-4C9E-992C-AA3E43D05460"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0.0",
"versionEndIncluding": "6.2.0.1",
"matchCriteriaId": "739F6EB7-6130-4EAD-AF39-2D0F2249BCF9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234888",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45094",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-27T23:15:21.093",
"lastModified": "2025-05-28T15:01:30.720",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:51:17.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,116 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.ibm.com/support/pages/node/7234276",
"source": "psirt@us.ibm.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:hardware_management_console_r10.0_firmware:10.0.245.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C14D7ACA-A436-4336-9714-4A23704BEBC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:hardware_management_console_r10.0_firmware:10.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9C367DAF-0256-4BC0-A9B8-3BB74371C08A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ibm:hardware_management_console_r10.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA58EDF6-EACA-4337-8EB7-6C5F375907A4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.4_firmware:89.40.83.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E66184DD-CC9A-4285-BBB4-72D09D5417EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.4_firmware:89.41.25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "151F5EA6-A9F0-4470-91BE-049E87FEA507"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.4_firmware:89.42.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB00FAC3-685F-41FC-BD7D-DCBB87E52958"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ibm:hardware_management_console_r9.4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B2F91BA-AE0A-4988-ABFB-02B545BCF1A2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.3_firmware:89.33.45.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99A3CDB3-4A6D-499B-913E-A0B220C09B19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:hardware_management_console_r9.3_firmware:89.33.52.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EEBC9010-19AC-48F2-A3B6-8659C8D87EFA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ibm:hardware_management_console_r9.3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "392890ED-DB84-4904-AD60-A993A248FF85"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234276",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-47081",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-09T18:15:24.983",
"lastModified": "2025-06-09T18:15:24.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/psf/requests/pull/6965",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"source": "security-advisories@github.com"
},
{
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"source": "security-advisories@github.com"
},
{
"url": "https://seclists.org/fulldisclosure/2025/Jun/2",
"source": "security-advisories@github.com"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Jun/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48019",
"sourceIdentifier": "security@apache.org",
"published": "2025-02-04T19:15:31.733",
"lastModified": "2025-02-07T22:15:12.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:49:43.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -53,16 +53,59 @@
"value": "CWE-552"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.1.0",
"versionEndExcluding": "2.1.8",
"matchCriteriaId": "F80E2297-7690-4751-9027-10D1A6B9964F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.3",
"matchCriteriaId": "A690C58E-4B42-402D-B627-1E7D79E8AA83"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/p70klgmyrgknhn0t195261wvwv5jw6hr",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/02/04/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48704",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T16:15:24.403",
"lastModified": "2025-06-02T18:15:23.020",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:00:51.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49350",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-29T20:15:25.213",
"lastModified": "2025-05-30T16:31:03.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:59:11.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,12 +69,100 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "11.1",
"versionEndIncluding": "11.1.4.7",
"matchCriteriaId": "DB12E021-90D2-456A-8538-109B4B4E937A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
"versionStartIncluding": "11.1",
"versionEndIncluding": "11.1.4.7",
"matchCriteriaId": "6DC85F9D-CD17-472B-B413-088145588214"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "11.1",
"versionEndIncluding": "11.1.4.7",
"matchCriteriaId": "D396078C-3A43-4D93-9BBB-D68652D2C59B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "A9058600-75B6-4228-9B77-C6DAF915F158"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "A7C9B6A1-749A-4388-AC61-318F79DB4519"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "C7DD6EFE-C2DA-42BC-931C-4C347F49BE72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "685E5B9C-F82E-4BF5-84D2-709CA5FB7F3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "41FD572B-97C2-4734-BCE7-2F9D59D38C22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "21C731C8-8712-4B60-852E-70B5EB61C43A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7235069",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51453",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T16:15:33.043",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:58:08.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -51,10 +71,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.ibm.com/support/pages/node/7234887",
"source": "psirt@us.ibm.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_secure_proxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0.0",
"versionEndIncluding": "6.2.0.1",
"matchCriteriaId": "739F6EB7-6130-4EAD-AF39-2D0F2249BCF9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234887",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51715",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-07T11:15:08.460",
"lastModified": "2025-01-07T11:15:08.460",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:30:31.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/clickwhale/vulnerability/wordpress-clickwhale-plugin-2-4-1-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flowdee:clickwhale:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4.2",
"matchCriteriaId": "4B5BC4EB-40C7-4C8F-93FA-4F5D678E0893"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/clickwhale/vulnerability/wordpress-clickwhale-plugin-2-4-1-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51941",
"sourceIdentifier": "security@apache.org",
"published": "2025-01-21T22:15:12.447",
"lastModified": "2025-01-22T15:15:14.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:35:29.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,51 @@
"value": "CWE-75"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.7.8",
"matchCriteriaId": "F657FE3D-6887-40EF-91E2-910EE1997D2D"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/xq50nlff7o7z1kq3y637clzzl6mjhl8j",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/01/21/9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53814",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-09T14:15:12.003",
"lastModified": "2024-12-09T14:15:12.003",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:29:39.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-4-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:analytify:analytify_-_google_analytics_dashboard:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.5.0",
"matchCriteriaId": "4C9A7029-14CF-4914-A850-85CB6A5C8CE7"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-4-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53908",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-06T12:15:18.583",
"lastModified": "2024-12-06T17:15:12.350",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:51:17.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://docs.djangoproject.com/en/dev/releases/security/",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.2.17",
"matchCriteriaId": "43AD4E98-EF36-4D24-9F42-3235DFBCFF75"
},
{
"url": "https://groups.google.com/g/django-announce",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndExcluding": "5.0.10",
"matchCriteriaId": "6EAB5D22-7E1E-45E7-A577-95051DC91E5E"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/12/04/3",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.1.4",
"matchCriteriaId": "1231C967-2BD2-4263-B892-500964ED3C12"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.djangoproject.com/en/dev/releases/security/",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://groups.google.com/g/django-announce",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/12/04/3",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56277",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-21T14:15:09.593",
"lastModified": "2025-01-21T14:15:09.593",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:33:43.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/poll-maker/vulnerability/wordpress-poll-maker-plugin-5-5-5-html-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ays-pro:poll_maker:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "5.5.5",
"matchCriteriaId": "19A61F63-5617-455C-AA20-0CA79E7DA222"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/poll-maker/vulnerability/wordpress-poll-maker-plugin-5-5-5-html-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1499",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:24.230",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:08:54.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,35 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.ibm.com/support/pages/node/7233154",
"source": "psirt@us.ibm.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:infosphere_information_server_on_cloud:11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BCD0E05-A8D1-4F6E-B88C-A48CCE006EDB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7233154",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-20063",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:20.493",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:07:27.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque que las aplicaciones se bloqueen mediante confusi\u00f3n de tipos."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -47,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-21082",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:21.433",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:07:20.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque que las aplicaciones se bloqueen mediante confusi\u00f3n de tipos."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -47,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22296",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-07T17:15:32.520",
"lastModified": "2025-01-07T17:15:32.520",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:30:55.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/hash-elements/vulnerability/wordpress-hash-elements-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hashthemes:hash_elements:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.1",
"matchCriteriaId": "9273F6A9-B73A-41EB-AFD4-F2ED3F762CFE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/hash-elements/vulnerability/wordpress-hash-elements-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23195",
"sourceIdentifier": "security@apache.org",
"published": "2025-01-21T22:15:12.863",
"lastModified": "2025-01-22T15:15:15.237",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:36:09.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://lists.apache.org/thread/hsb6mvxd7g37dq1ygtd0pd88gs9tfcwq",
"source": "security@apache.org"
},
"nodes": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/01/21/7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.9",
"matchCriteriaId": "DAB94B88-4AAB-4690-8A00-DD223D72E8D4"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/hsb6mvxd7g37dq1ygtd0pd88gs9tfcwq",
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/01/21/7",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23196",
"sourceIdentifier": "security@apache.org",
"published": "2025-01-21T22:15:12.987",
"lastModified": "2025-01-22T15:15:15.390",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:42:00.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://lists.apache.org/thread/70g1l5lxvko7kvhyxmtmklhhfrlon837",
"source": "security@apache.org"
},
"nodes": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/01/21/8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.9",
"matchCriteriaId": "DAB94B88-4AAB-4690-8A00-DD223D72E8D4"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/70g1l5lxvko7kvhyxmtmklhhfrlon837",
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/01/21/8",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-23235",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:21.590",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:07:15.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un ataque DOS mediante lecturas fuera de los l\u00edmites."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -47,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-24493",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:21.763",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:07:08.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores, permitir que un atacante local provoque una fuga de informaci\u00f3n a trav\u00e9s de una condici\u00f3n de ejecuci\u00f3n."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
@ -47,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24543",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-24T18:15:32.703",
"lastModified": "2025-01-24T18:15:32.703",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:34:04.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rstheme:ultimate_coming_soon_\\&_maintenance:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "4859FD15-6E91-4829-A1A5-3452428F5586"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24546",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-24T18:15:32.893",
"lastModified": "2025-01-24T18:15:32.893",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:34:47.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rstheme:ultimate_coming_soon_\\&_maintenance:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "4859FD15-6E91-4829-A1A5-3452428F5586"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24650",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-24T18:15:39.347",
"lastModified": "2025-01-24T18:15:39.347",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:53:22.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/tourfic/vulnerability/wordpress-tourfic-plugin-2-15-3-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themefic:tourfic:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.15.4",
"matchCriteriaId": "9CE4D8B0-0461-441A-80F1-C1F9B8A7663E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/tourfic/vulnerability/wordpress-tourfic-plugin-2-15-3-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24698",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-24T18:15:43.050",
"lastModified": "2025-01-24T18:15:43.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:54:46.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/essential-real-estate/vulnerability/wordpress-essential-real-estate-plugin-5-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:g5plus:essential_real_estate:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.1.9",
"matchCriteriaId": "03557490-8DA3-47C6-BF6D-98B6519EE284"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/essential-real-estate/vulnerability/wordpress-essential-real-estate-plugin-5-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24715",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-24T18:15:44.913",
"lastModified": "2025-01-24T18:15:44.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:55:37.650",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/counter-box/vulnerability/wordpress-counter-box-plugin-2-0-5-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wow-company:counter_box:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.6",
"matchCriteriaId": "510D2249-A147-4E35-A7C4-CAB3239FADD8"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/counter-box/vulnerability/wordpress-counter-box-plugin-2-0-5-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24733",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-24T18:15:47.697",
"lastModified": "2025-01-24T18:15:47.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:56:58.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,12 +69,43 @@
"value": "CWE-98"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:addonmaster:post_grid_master:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.4.13",
"matchCriteriaId": "34808680-0416-4C78-876A-DA6892695A78"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ajax-filter-posts/vulnerability/wordpress-post-grid-master-plugin-3-4-12-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24736",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-24T18:15:47.850",
"lastModified": "2025-01-24T18:15:47.850",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:00:07.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-35-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metaphorcreations:post_duplicator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.36",
"matchCriteriaId": "541EA3E3-67BC-48C1-B3F1-0EF0A834D303"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-35-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24860",
"sourceIdentifier": "security@apache.org",
"published": "2025-02-04T11:15:09.107",
"lastModified": "2025-02-15T01:15:11.327",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:43:36.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,61 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://lists.apache.org/thread/yjo5on4tf7s1r9qklc4byrz30b8vkm2d",
"source": "security@apache.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.0.16",
"matchCriteriaId": "282DA169-6FCB-4381-9B68-CAA2D415E64D"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/02/03/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.0",
"versionEndExcluding": "4.1.8",
"matchCriteriaId": "B436C4E3-A38B-42E4-AFF4-C057BE7E156C"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250214-0005/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.3",
"matchCriteriaId": "7BFBF10F-8408-495D-99E6-AE122CDD87CC"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/yjo5on4tf7s1r9qklc4byrz30b8vkm2d",
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/02/03/3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250214-0005/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25044",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:25.317",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:08:44.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,35 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.ibm.com/support/pages/node/7235182",
"source": "psirt@us.ibm.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7235182",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25217",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:21.933",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:07:00.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la desreferencia de un puntero NULL."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -47,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2518",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-29T20:15:26.137",
"lastModified": "2025-05-30T16:31:03.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:59:23.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,12 +69,79 @@
"value": "CWE-789"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "A9058600-75B6-4228-9B77-C6DAF915F158"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "A7C9B6A1-749A-4388-AC61-318F79DB4519"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "C7DD6EFE-C2DA-42BC-931C-4C347F49BE72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "685E5B9C-F82E-4BF5-84D2-709CA5FB7F3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "41FD572B-97C2-4734-BCE7-2F9D59D38C22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "21C731C8-8712-4B60-852E-70B5EB61C43A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7235072",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-26691",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.093",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:06:52.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos."
}
],
"metrics": {
@ -47,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-26693",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.260",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:06:44.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -47,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27131",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.423",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:06:16.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS\u00a0through improper input."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un DOS a trav\u00e9s de una entrada incorrecta."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,12 +69,43 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27242",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.583",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:06:09.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un DOS a trav\u00e9s de una entrada incorrecta."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,12 +69,43 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27247",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.733",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:05:57.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos."
}
],
"metrics": {
@ -47,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27563",
"sourceIdentifier": "scy@openharmony.io",
"published": "2025-06-08T12:15:22.917",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:05:03.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission."
},
{
"lang": "es",
"value": "En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cause fugas de informaci\u00f3n mediante la obtenci\u00f3n de permisos."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -47,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"versionEndIncluding": "5.0.3",
"matchCriteriaId": "3FF0EA48-E2F6-4535-A668-108850DFF515"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
"source": "scy@openharmony.io",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2896",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:25.483",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:08:36.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,35 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.ibm.com/support/pages/node/7235182",
"source": "psirt@us.ibm.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7235182",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29306",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-27T19:15:49.290",
"lastModified": "2025-04-11T17:50:50.240",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:02:02.093",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,8 +61,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxcms:foxcms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.00",
"matchCriteriaId": "1EB18EC9-B9F3-4B18-BF1C-D09B20463740"
"versionEndExcluding": "1.2",
"matchCriteriaId": "16581572-220B-4631-AFAD-1691D78AB612"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30087",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-28T18:15:26.540",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:58:37.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,18 +71,53 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://docs.bestpractical.com/release-notes/rt/4.4.8",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.8",
"matchCriteriaId": "DBAC2A90-1130-4970-BEE6-C0217F1B2CDE"
},
{
"url": "https://docs.bestpractical.com/release-notes/rt/5.0.8",
"source": "cve@mitre.org"
},
{
"url": "https://docs.bestpractical.com/release-notes/rt/index.html",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.8",
"matchCriteriaId": "BF58D4AE-EBC9-4F20-8ADF-E65F88BEC12D"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.bestpractical.com/release-notes/rt/4.4.8",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.bestpractical.com/release-notes/rt/5.0.8",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.bestpractical.com/release-notes/rt/index.html",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30867",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-27T11:15:47.960",
"lastModified": "2025-03-27T16:45:12.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:01:19.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/searchiq/vulnerability/wordpress-searchiq-plugin-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:searchiq:searchiq:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.8",
"matchCriteriaId": "D8A41B59-99A0-4E9C-97F2-1B719A56D167"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/searchiq/vulnerability/wordpress-searchiq-plugin-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30871",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-27T11:15:48.243",
"lastModified": "2025-03-27T16:45:12.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:04:53.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-travel-engine/vulnerability/wordpress-wp-travel-engine-plugin-6-3-5-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wptravelengine:wp_travel_engine:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.3.6",
"matchCriteriaId": "810F9D66-5381-4EAE-B7E2-DAE0BC990392"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-travel-engine/vulnerability/wordpress-wp-travel-engine-plugin-6-3-5-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30873",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-27T11:15:48.523",
"lastModified": "2025-03-27T16:45:12.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:16:48.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/greenshift-animation-and-page-builder-blocks/vulnerability/wordpress-greenshift-plugin-11-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "11.1",
"matchCriteriaId": "5E0B71B4-71B9-4D8A-8910-8A775C7B6483"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/greenshift-animation-and-page-builder-blocks/vulnerability/wordpress-greenshift-plugin-11-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30897",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-27T11:15:50.777",
"lastModified": "2025-03-27T16:45:12.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:18:55.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-5-1-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:analytify:analytify_-_google_analytics_dashboard:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.0.0",
"matchCriteriaId": "D2D2A1CC-6E26-4941-AC0B-C7F373D5647E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-5-1-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3050",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-29T20:15:26.690",
"lastModified": "2025-05-30T16:31:03.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:59:36.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -51,10 +71,67 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.ibm.com/support/pages/node/7235073",
"source": "psirt@us.ibm.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "A9058600-75B6-4228-9B77-C6DAF915F158"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "A7C9B6A1-749A-4388-AC61-318F79DB4519"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "11.5",
"versionEndIncluding": "11.5.9",
"matchCriteriaId": "C7DD6EFE-C2DA-42BC-931C-4C347F49BE72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "685E5B9C-F82E-4BF5-84D2-709CA5FB7F3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "41FD572B-97C2-4734-BCE7-2F9D59D38C22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.1.0",
"versionEndIncluding": "12.1.1",
"matchCriteriaId": "21C731C8-8712-4B60-852E-70B5EB61C43A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7235073",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31500",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-28T18:15:26.700",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:58:52.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,14 +71,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://docs.bestpractical.com/release-notes/rt/5.0.8",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://docs.bestpractical.com/release-notes/rt/index.html",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.8",
"matchCriteriaId": "BF58D4AE-EBC9-4F20-8ADF-E65F88BEC12D"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.bestpractical.com/release-notes/rt/5.0.8",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.bestpractical.com/release-notes/rt/index.html",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-31501",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-28T18:15:26.857",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:59:03.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,14 +71,46 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://docs.bestpractical.com/release-notes/rt/5.0.8",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.8",
"matchCriteriaId": "DBAC2A90-1130-4970-BEE6-C0217F1B2CDE"
},
{
"url": "https://docs.bestpractical.com/release-notes/rt/index.html",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.8",
"matchCriteriaId": "BF58D4AE-EBC9-4F20-8ADF-E65F88BEC12D"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.bestpractical.com/release-notes/rt/5.0.8",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.bestpractical.com/release-notes/rt/index.html",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-32238",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-04T16:15:33.233",
"lastModified": "2025-04-07T14:18:15.560",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T19:21:20.070",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-wordpress-by-vcita-plugin-4-5-2-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.5.2",
"matchCriteriaId": "DDCB04AE-6003-4721-A867-6ABFB8CAD211"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-wordpress-by-vcita-plugin-4-5-2-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-32455",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:30.993",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-09T19:15:24.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
},
{
"lang": "es",
"value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento run_cmd), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-32456",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.267",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-09T19:15:24.287",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
},
{
"lang": "es",
"value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento put_file_to_qtn), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-32457",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.403",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-09T19:15:24.393",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
},
{
"lang": "es",
"value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento get_file_from_qtn), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-32458",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.537",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-09T19:15:24.497",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
},
{
"lang": "es",
"value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento get_syslog_from_qtn), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-32459",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:31.673",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-09T19:15:24.597",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
"value": "The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\n\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
},
{
"lang": "es",
"value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, router_command.sh (en el argumento sync_time), vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-33004",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:25.643",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:08:21.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,10 +71,35 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.ibm.com/support/pages/node/7235182",
"source": "psirt@us.ibm.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7235182",
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-33005",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-01T12:15:25.807",
"lastModified": "2025-06-02T17:32:17.397",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:07:39.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,12 +69,47 @@
"value": "CWE-613"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7235182",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-33079",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-27T02:15:19.393",
"lastModified": "2025-05-28T15:01:30.720",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:49:31.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,52 @@
"value": "CWE-256"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB85020-BF02-4C91-B494-93FB19185006"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cognos_controller:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14DFBD62-8263-4F2F-90C5-A4A508E43B79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234720",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3357",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T15:15:24.737",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:56:33.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,47 @@
"value": "CWE-1285"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:-:*:*:*:*:*:*",
"matchCriteriaId": "15633ADC-6913-4AA1-8524-F139895B1C9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp19:*:*:*:*:*:*",
"matchCriteriaId": "2AAFF1A2-750F-4C08-B544-0D6BC56D2048"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234923",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3459",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.770",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-09T19:15:24.707",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
"value": "The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
},
{
"lang": "es",
"value": "El Chipset Quantenna Wi-Fi se entrega con un script de control local, transmit_file, vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima que es CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del SDK m\u00e1s reciente y, al parecer, no se hab\u00eda corregido al momento de la publicaci\u00f3n inicial de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de pr\u00e1cticas recomendadas para los implementadores de este chipset."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3460",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:32.900",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-09T19:15:24.810",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
"value": "The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, \"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'),\" and is estimated as a CVSS 7.7\u00a0(CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
},
{
"lang": "es",
"value": "El Chipset Wi-Fi Quantenna se entrega con un script de control local, set_tx_pow, vulnerable a la inyecci\u00f3n de comandos. Se trata de una instancia de CWE-88, \"Neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando ('Inyecci\u00f3n de argumentos')\", y se estima como CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Quantenna Wi-Fi hasta la versi\u00f3n 8.0.0.28 del \u00faltimo SDK, y parece no tener parche en el momento de la primera publicaci\u00f3n de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de mejores pr\u00e1cticas para los implementadores de este chipset."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3461",
"sourceIdentifier": "cve@takeonme.org",
"published": "2025-06-08T21:15:33.030",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-09T19:15:24.923",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 ( CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
"value": "The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, \"Missing Authentication for Critical Function,\" and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).\nThis issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset."
},
{
"lang": "es",
"value": "Los Chips Wi-Fi Quantenna se entregan con una interfaz Telnet no autenticada por defecto. Se trata de una instancia de CWE-306, \"Falta de autenticaci\u00f3n para funci\u00f3n cr\u00edtica\", y se estima que es un CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). Este problema afecta al chipset Wi-Fi Quantenna hasta la versi\u00f3n 8.0.0.28 del SDK m\u00e1s reciente y, al parecer, no se hab\u00eda corregido al momento de la publicaci\u00f3n inicial de este registro CVE, aunque el proveedor ha publicado una gu\u00eda de pr\u00e1cticas recomendadas para los implementadores de este chipset."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-36572",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-05-28T17:15:24.093",
"lastModified": "2025-05-29T14:29:50.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:58:23.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,93 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000325205/dsa-2025-223-dell-powerstore-t-security-update-for-multiple-vulnerabilities",
"source": "security_alert@emc.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:powerstoreos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.1.3-2494147",
"matchCriteriaId": "ACB8A1DE-3010-4498-A606-72A916B45DB5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_1000t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5BE2B0-BB56-4E6C-8818-26910B23CE31"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_1200t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB965674-7EBA-437E-A13B-39BC3F3FE139"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_3000t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "861B5BE7-159A-41FF-9658-D243051CAC88"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_3200q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8456D5B0-3D6A-4020-B693-D949EE2BA12E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_3200t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A29ED1-5CE6-4D49-A079-7F4E6D782DE1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_5000t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D5EE934-AD08-4C2B-B3EA-878975EE825E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B529671-71A1-428C-BC17-C8E002222FEA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_5200t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FCFFD4-A989-4AF3-99DF-32AE2547D9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_7000t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37E8CD6E-65F4-48A0-B796-93E4EE51BD06"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_9000t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BB1B88-C9C0-4B08-84C6-279C79E34CD3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:powerstore_9200t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F90EFCBC-F720-4426-8043-EB1489820C22"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000325205/dsa-2025-223-dell-powerstore-t-security-update-for-multiple-vulnerabilities",
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-43923",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T15:15:58.767",
"lastModified": "2025-06-04T21:15:39.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:05:07.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.unicomsi.com/products/focal-point/",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.unicomsi.com/security-advisory/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unicomsi:focal_point:7.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9D259EEA-3122-4331-84C7-5F7EEB8905C1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.unicomsi.com/products/focal-point/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.unicomsi.com/security-advisory/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-43924",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T15:15:58.883",
"lastModified": "2025-06-04T21:15:39.213",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:04:54.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.unicomsi.com/products/focal-point/",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.unicomsi.com/security-advisory/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unicomsi:focal_point:7.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9D259EEA-3122-4331-84C7-5F7EEB8905C1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.unicomsi.com/products/focal-point/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.unicomsi.com/security-advisory/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-44148",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T16:15:25.210",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:04:33.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://mailenable.com",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/barisbaydur/CVE-2025-44148",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.00",
"matchCriteriaId": "931A5393-286E-4E7F-B608-51ACBEAD2AE7"
}
]
}
]
}
],
"references": [
{
"url": "http://mailenable.com",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/barisbaydur/CVE-2025-44148",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-45997",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-28T14:15:33.763",
"lastModified": "2025-05-28T15:15:24.900",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:53:36.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/litsasuk/CVE-POC/blob/main/CVE-2025-45997.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.sourcecodester.com/php/17883/web-based-product-alert-system.html",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:senior-walter:web-based_pharmacy_product_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB2DA030-DE10-4DA9-86D7-3E3E9A22DABC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/litsasuk/CVE-POC/blob/main/CVE-2025-45997.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/php/17883/web-based-product-alert-system.html",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-46154",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-03T14:15:48.880",
"lastModified": "2025-06-04T14:54:33.783",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-09T18:06:28.423",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/Yf3te/CVE/blob/main/CVE-2025-46154",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxcms:foxcms:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "65D3953A-E10D-496B-A9BB-BB5A287739AE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Yf3te/CVE/blob/main/CVE-2025-46154",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More