Auto-Update: 2025-06-10T20:00:19.940571+00:00

This commit is contained in:
cad-safe-bot 2025-06-10 20:03:55 +00:00
parent 6373b0765d
commit 9228c40301
82 changed files with 4488 additions and 554 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2921",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-06-06T06:15:30.597",
"lastModified": "2025-06-09T20:15:22.043",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:31:20.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wpscan.com/vulnerability/0f85db4f-8493-4941-8f3c-e5258c581bdc/",
"source": "contact@wpscan.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wpscan.com/vulnerability/0f85db4f-8493-4941-8f3c-e5258c581bdc/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaizencoders:short_url:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.8",
"matchCriteriaId": "0884698E-F4C6-4877-9B0C-021DB7C8A624"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/0f85db4f-8493-4941-8f3c-e5258c581bdc/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/0f85db4f-8493-4941-8f3c-e5258c581bdc/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-43609",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-09T04:15:07.583",
"lastModified": "2024-11-21T08:24:27.500",
"lastModified": "2025-06-10T19:15:26.357",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\n\n\n\n\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could obtain access to sensitive information or cause a denial-of-service condition.\n\n\n\n\n\n\n\n"
"value": "In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could obtain access to sensitive information or cause a denial-of-service condition."
},
{
"lang": "es",
@ -62,17 +62,17 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-51761",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-09T04:15:08.210",
"lastModified": "2024-11-21T08:38:44.447",
"lastModified": "2025-06-10T19:15:27.317",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\n\n\nIn Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could bypass authentication and acquire admin capabilities.\n\n\n\n\n\n"
"value": "In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could bypass authentication and acquire admin capabilities."
},
{
"lang": "es",
@ -62,17 +62,17 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22251",
"sourceIdentifier": "security@vmware.com",
"published": "2024-02-29T01:44:05.870",
"lastModified": "2024-11-21T08:55:53.500",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:33:10.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.4,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
@ -51,14 +71,68 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html",
"source": "security@vmware.com"
},
"nodes": [
{
"url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.5.1",
"matchCriteriaId": "A60E064C-3C0F-48EF-B650-41601571B3A1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0.0",
"versionEndExcluding": "13.5.1",
"matchCriteriaId": "50649AB8-57FD-4210-A7F4-3AD7D00F6A91"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html",
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25830",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T01:44:16.533",
"lastModified": "2024-11-21T09:01:23.427",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:22:13.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,14 +55,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://neroteam.com/blog/f-logic-datacube3-vulnerability-report",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:f-logic:datacube3_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F73E586-1AD1-4280-B63B-CFB91BD33BF0"
}
]
},
{
"url": "https://neroteam.com/blog/f-logic-datacube3-vulnerability-report",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:f-logic:datacube3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0F1221C-A9CB-4625-AABD-2E4890FA6E93"
}
]
}
]
}
],
"references": [
{
"url": "https://neroteam.com/blog/f-logic-datacube3-vulnerability-report",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://neroteam.com/blog/f-logic-datacube3-vulnerability-report",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27719",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T19:15:48.570",
"lastModified": "2024-11-21T09:04:57.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:18:36.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,53 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.sourcecodester.com/php/17175/faq-management-system-using-php-and-mysql-source-code.html",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.sourcecodester.com/php/17175/faq-management-system-using-php-and-mysql-source-code.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:rems:faq_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8A73BB-1A2E-49E8-A254-06DBA6CDA8CB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.sourcecodester.com/php/17175/faq-management-system-using-php-and-mysql-source-code.html",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/php/17175/faq-management-system-using-php-and-mysql-source-code.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28725",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T21:15:48.317",
"lastModified": "2024-11-21T09:06:49.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:42:27.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,57 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/asenzhenshuai/DongDong/blob/main/yzmcms-xss.pdf",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/asenzhenshuai/DongDong/issues/1",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/asenzhenshuai/DongDong/blob/main/yzmcms-xss.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/asenzhenshuai/DongDong/issues/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:yzmcms:yzmcms:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "610B7EEC-5FB1-47A2-B30A-4F30E638A544"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/asenzhenshuai/DongDong/blob/main/yzmcms-xss.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/asenzhenshuai/DongDong/issues/1",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/asenzhenshuai/DongDong/blob/main/yzmcms-xss.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/asenzhenshuai/DongDong/issues/1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31613",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T16:15:13.347",
"lastModified": "2024-11-21T09:13:45.743",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:14:29.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ss122-0ss/BOSSCMS/blob/main/bosscms%20csrf.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/ss122-0ss/BOSSCMS/blob/main/bosscms%20csrf.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosscms:bosscms:3.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "27CC6A89-4381-4F1F-AED2-973ADB8AD731"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ss122-0ss/BOSSCMS/blob/main/bosscms%20csrf.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ss122-0ss/BOSSCMS/blob/main/bosscms%20csrf.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33118",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T20:15:10.950",
"lastModified": "2024-11-21T09:16:32.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:43:40.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33118.txt",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33118.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:luckyframe:luckyframeweb:3.5.2:*:*:*:*:luckyframe:*:*",
"matchCriteriaId": "234D99F2-9A7A-49D5-B68F-773E3D60837B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33118.txt",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33118.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33300",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T19:15:26.910",
"lastModified": "2024-11-21T09:16:45.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:07:52.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/whoisoo6/Stored-xss-vulnerability-exists-in-Typra",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/whoisoo6/Stored-xss-vulnerability-exists-in-Typra",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "1.7.0",
"matchCriteriaId": "CD41BF35-3144-4C64-9D5F-3B3DDBD20C06"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/whoisoo6/Stored-xss-vulnerability-exists-in-Typra",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/whoisoo6/Stored-xss-vulnerability-exists-in-Typra",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33789",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T17:15:07.993",
"lastModified": "2024-11-21T09:17:29.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T18:01:58.607",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8"
}
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33809",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-24T15:15:24.040",
"lastModified": "2025-03-13T15:15:44.147",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:41:45.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/GaranR/f17b53fe3dd0a834c3acd288ed19b622",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/pingcap/tidb/issues/52159",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://gist.github.com/GaranR/f17b53fe3dd0a834c3acd288ed19b622",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/pingcap/tidb/issues/52159",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:pingcap:tidb:7.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E29ADD0B-CC40-4DA9-B9B8-3C12A76346FC"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/GaranR/f17b53fe3dd0a834c3acd288ed19b622",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/pingcap/tidb/issues/52159",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://gist.github.com/GaranR/f17b53fe3dd0a834c3acd288ed19b622",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/pingcap/tidb/issues/52159",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33921",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:09.020",
"lastModified": "2024-11-21T09:17:44.440",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T18:03:40.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-21-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-21-broken-access-control-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdeveloper:reviewx:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.22",
"matchCriteriaId": "AD1CA2DA-96AD-42A2-A196-5614760A06AA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-21-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-21-broken-access-control-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34401",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-03T01:15:48.577",
"lastModified": "2024-11-21T09:18:35.513",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:06:46.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.exploit-db.com/exploits/51988",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.exploit-db.com/exploits/51988",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:techkshetrainfo:savsoft_quiz:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5B5D6E-C991-499C-9F2C-E1937DF621E8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/51988",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/51988",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35110",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-17T08:15:06.073",
"lastModified": "2024-11-21T09:19:48.270",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:32:58.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/yzmcms/yzmcms/issues/68",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/yzmcms/yzmcms/issues/68",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yzmcms:yzmcms:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FDDCEC-266B-49F0-BA65-2264ADA97F49"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yzmcms/yzmcms/issues/68",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/yzmcms/yzmcms/issues/68",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36528",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T15:15:52.483",
"lastModified": "2024-11-21T09:22:20.440",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:31:33.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,46 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://mat4mee.notion.site/2-bug-chains-in-nukeViet-lead-to-RCE-bdd42b20b05a448fbe87c752b41bb15f",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nukeviet:nukeviet:*:*:*:*:egov:*:*:*",
"versionEndIncluding": "1.2.02",
"matchCriteriaId": "14576697-E8FA-4C70-BA46-EB50243F2E37"
},
{
"url": "https://mat4mee.notion.site/2-bug-chains-in-nukeViet-lead-to-RCE-bdd42b20b05a448fbe87c752b41bb15f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:nukeviet:nukeviet:*:*:*:*:-:*:*:*",
"versionEndIncluding": "4.5",
"matchCriteriaId": "A877C9E1-0EF3-40F6-9325-B8DB12AD3198"
}
]
}
]
}
],
"references": [
{
"url": "https://mat4mee.notion.site/2-bug-chains-in-nukeViet-lead-to-RCE-bdd42b20b05a448fbe87c752b41bb15f",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://mat4mee.notion.site/2-bug-chains-in-nukeViet-lead-to-RCE-bdd42b20b05a448fbe87c752b41bb15f",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36531",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T15:15:52.550",
"lastModified": "2024-11-21T09:22:20.657",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:26:17.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,46 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://mat4mee.notion.site/Module-upload-in-nukeViet-leads-to-RCE-01ff3ff4c80d402d8c7c8a2b15a24c33",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nukeviet:nukeviet:*:*:*:*:egov:*:*:*",
"versionEndIncluding": "1.2.02",
"matchCriteriaId": "14576697-E8FA-4C70-BA46-EB50243F2E37"
},
{
"url": "https://mat4mee.notion.site/Module-upload-in-nukeViet-leads-to-RCE-01ff3ff4c80d402d8c7c8a2b15a24c33",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:nukeviet:nukeviet:*:*:*:*:-:*:*:*",
"versionEndIncluding": "4.5",
"matchCriteriaId": "A877C9E1-0EF3-40F6-9325-B8DB12AD3198"
}
]
}
]
}
],
"references": [
{
"url": "https://mat4mee.notion.site/Module-upload-in-nukeViet-leads-to-RCE-01ff3ff4c80d402d8c7c8a2b15a24c33",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://mat4mee.notion.site/Module-upload-in-nukeViet-leads-to-RCE-01ff3ff4c80d402d8c7c8a2b15a24c33",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-37394",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T18:15:29.527",
"lastModified": "2025-06-10T18:15:29.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Project Dashboards of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Dashboard title' and 'Dashboard content' text boxes. This can lead to the execution of malicious scripts when the dashboard is viewed. Users are recommended to update to version 14.2.1 or later to mitigate this vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-37395",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T18:15:29.660",
"lastModified": "2025-06-10T18:15:29.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Public Survey function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Survey Title' and 'Survey Instructions' fields. This vulnerability could be exploited by attackers to execute malicious scripts when the survey is accessed through its public link. It is advised to update to version 14.2.1 or later to fix this issue."
}
],
"metrics": {},
"references": [
{
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-37396",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-10T18:15:29.773",
"lastModified": "2025-06-10T18:15:29.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Calendar function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Notes' field of a calendar event. This could lead to the execution of malicious scripts when the event is viewed. Updating to version 14.2.1 or later is recommended to remediate this vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
"source": "cve@mitre.org"
},
{
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37840",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-17T19:15:58.470",
"lastModified": "2024-11-21T09:24:22.330",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:12:34.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/ganzhi-qcy/cve/issues/4",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/ganzhi-qcy/cve/issues/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ganzhi-qcy/cve/issues/4",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ganzhi-qcy/cve/issues/4",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48178",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-28T20:15:05.843",
"lastModified": "2024-10-30T18:35:13.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:44:10.583",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/dabaizhizhu/123/issues/10",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:newbee-mall_project:newbee-mall:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0A6046-1A4C-488F-B8BF-6E0A3A50E5DC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dabaizhizhu/123/issues/10",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48228",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T22:15:02.383",
"lastModified": "2024-10-28T20:35:19.150",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:46:12.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/funadmin/funadmin/issues/31",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/funadmin/funadmin/issues/31",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48231",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T12:15:08.380",
"lastModified": "2024-10-21T19:35:06.217",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:57:51.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/funadmin/funadmin/issues/29",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/funadmin/funadmin/issues/29",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48424",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:14.223",
"lastModified": "2024-10-28T18:35:03.257",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:52:19.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/assimp/assimp/issues/5787",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/assimp/assimp/issues/5787",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48425",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:14.303",
"lastModified": "2024-10-28T19:35:28.823",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T18:47:27.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/assimp/assimp/issues/5791",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/assimp/assimp/issues/5791",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0051",
"sourceIdentifier": "psirt@purestorage.com",
"published": "2025-06-10T18:15:30.030",
"lastModified": "2025-06-10T18:15:30.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation performed during the authentication process of FlashArray could lead to a system Denial of Service."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@purestorage.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "psirt@purestorage.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://support.purestorage.com/bundle/m_security_bulletins/page/Pure_Security/topics/concept/c_security_bulletins.html",
"source": "psirt@purestorage.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0052",
"sourceIdentifier": "psirt@purestorage.com",
"published": "2025-06-10T18:15:30.180",
"lastModified": "2025-06-10T18:15:30.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation performed during the authentication process of FlashBlade could lead to a system Denial of Service."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@purestorage.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "psirt@purestorage.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://support.purestorage.com/bundle/m_security_bulletins/page/Pure_Security/topics/concept/c_security_bulletins.html",
"source": "psirt@purestorage.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-2474",
"sourceIdentifier": "secure@blackberry.com",
"published": "2025-06-10T18:15:30.477",
"lastModified": "2025-06-10T18:15:30.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@blackberry.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@blackberry.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://support.blackberry.com/pkb/s/article/140646",
"source": "secure@blackberry.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-2884",
"sourceIdentifier": "cret@cert.org",
"published": "2025-06-10T18:15:30.617",
"lastModified": "2025-06-10T19:15:28.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 of TCG standard TPM2.0"
}
],
"metrics": {},
"references": [
{
"url": "https://trustedcomputinggroup.org/about/security/",
"source": "cret@cert.org"
},
{
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TPM2.0-Library-Spec-v1.83-Errata_v1_pub.pdf",
"source": "cret@cert.org"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.kb.cert.org/vuls/id/282450",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30327",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:29.600",
"lastModified": "2025-06-10T19:15:29.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InCopy versions 20.2, 19.5.3 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-41.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36574",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-06-10T18:15:30.883",
"lastModified": "2025-06-10T18:15:30.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.2, contain an Absolute Path Traversal vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure and Unauthorized access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-36"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000325679/dsa-2025-226",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36575",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-06-10T18:15:31.060",
"lastModified": "2025-06-10T18:15:31.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.2, contain an Exposure of Sensitive Information Through Data Queries vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-202"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000325679/dsa-2025-226",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36576",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-06-10T18:15:31.217",
"lastModified": "2025-06-10T18:15:31.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.2, contain a Cross-Site Request Forgery (CSRF) vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Server-side request forgery."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 2.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000325679/dsa-2025-226",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36577",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-06-10T18:15:31.363",
"lastModified": "2025-06-10T18:15:31.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.2, contain an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000325679/dsa-2025-226",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36578",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-06-10T18:15:31.513",
"lastModified": "2025-06-10T18:15:31.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.2, contain an Incorrect Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000325679/dsa-2025-226",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36580",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-06-10T18:15:31.660",
"lastModified": "2025-06-10T18:15:31.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Wyse Management Suite, versions prior to WMS 5.2, contain an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000325679/dsa-2025-226",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-41646",
"sourceIdentifier": "info@cert.vde.com",
"published": "2025-06-06T15:15:26.183",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:29:22.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://psirt.kunbus.com/.well-known/csaf/white/2025/kunbus-2025-0000003.json",
"source": "info@cert.vde.com"
},
"nodes": [
{
"url": "https://www.kunbus.com/en/productsecurity/Kunbus-2025-0000003",
"source": "info@cert.vde.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kunbus:revpi_status:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.6",
"matchCriteriaId": "B5AB814D-A49E-4331-93F1-112580C10B44"
}
]
}
]
}
],
"references": [
{
"url": "https://psirt.kunbus.com/.well-known/csaf/white/2025/kunbus-2025-0000003.json",
"source": "info@cert.vde.com",
"tags": [
"Product"
]
},
{
"url": "https://www.kunbus.com/en/productsecurity/Kunbus-2025-0000003",
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43550",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:32.120",
"lastModified": "2025-06-10T19:15:32.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43573",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:32.273",
"lastModified": "2025-06-10T19:15:32.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43574",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:32.427",
"lastModified": "2025-06-10T19:15:32.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43575",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:32.570",
"lastModified": "2025-06-10T19:15:32.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43576",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:32.723",
"lastModified": "2025-06-10T19:15:32.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43577",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:32.893",
"lastModified": "2025-06-10T19:15:32.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43578",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:33.050",
"lastModified": "2025-06-10T19:15:33.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43579",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:33.200",
"lastModified": "2025-06-10T19:15:33.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an Information Exposure vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to gain unauthorized access to sensitive information. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43581",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T18:15:31.807",
"lastModified": "2025-06-10T18:15:31.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Substance3D - Sampler versions 5.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-55.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43588",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T18:15:32.063",
"lastModified": "2025-06-10T18:15:32.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Substance3D - Sampler versions 5.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-55.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-44040",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-21T21:16:03.263",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:34:47.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/hexomedin3/advisories/tree/main/CVE-2025-44040",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/orangehrm/orangehrm/releases/tag/v5.7",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:orangehrm:orangehrm:5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C227E334-2FCE-40B8-825D-9194A854CA01"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hexomedin3/advisories/tree/main/CVE-2025-44040",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/orangehrm/orangehrm/releases/tag/v5.7",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-45753",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-21T21:16:03.403",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:34:41.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.simonjuguna.com/cve-2025-45753-authenticated-remote-code-execution-vulnerability-in-vtiger-open-source-edition-v8-3-0/",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:8.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "031C0516-9769-485B-8632-F97CC5E45BEA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.simonjuguna.com/cve-2025-45753-authenticated-remote-code-execution-vulnerability-in-vtiger-open-source-edition-v8-3-0/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-45755",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-21T20:15:32.227",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:34:54.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,44 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.simonjuguna.com/cve-2025-45755-stored-cross-site-scripting-xss-vulnerability-in-vtiger-open-source-edition-v8-3-0/",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.vtiger.com/open-source-crm/",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.simonjuguna.com/cve-2025-45755-stored-cross-site-scripting-xss-vulnerability-in-vtiger-open-source-edition-v8-3-0/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"vulnerable": true,
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:8.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "031C0516-9769-485B-8632-F97CC5E45BEA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.simonjuguna.com/cve-2025-45755-stored-cross-site-scripting-xss-vulnerability-in-vtiger-open-source-edition-v8-3-0/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.vtiger.com/open-source-crm/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.simonjuguna.com/cve-2025-45755-stored-cross-site-scripting-xss-vulnerability-in-vtiger-open-source-edition-v8-3-0/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47107",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:33.347",
"lastModified": "2025-06-10T19:15:33.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InCopy versions 20.2, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-41.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47111",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:33.507",
"lastModified": "2025-06-10T19:15:33.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47112",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-06-10T19:15:33.667",
"lastModified": "2025-06-10T19:15:33.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb25-57.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-47176",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-06-10T17:23:59.800",
"lastModified": "2025-06-10T17:23:59.800",
"lastModified": "2025-06-10T18:15:32.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47176",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-48432",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-05T03:15:25.563",
"lastModified": "2025-06-10T17:24:19.100",
"lastModified": "2025-06-10T18:15:32.790",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -79,6 +79,10 @@
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/10/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/10/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-21T21:16:03.970",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:34:33.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,73 @@
"value": "CWE-120"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freefloat:ftp_server:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4425C709-720F-4D39-9983-525BF907CB66"
}
]
}
]
}
],
"references": [
{
"url": "https://fitoxs.com/exploit/exploit-844fd54e7c56f8d038fc23d799cbff05d37452bc15f9a7203808d082de4a475f.txt",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.309872",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309872",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581285",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://fitoxs.com/exploit/exploit-844fd54e7c56f8d038fc23d799cbff05d37452bc15f9a7203808d082de4a475f.txt",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5119",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-23T21:15:21.080",
"lastModified": "2025-05-28T14:58:52.920",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:34:07.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,77 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emlog:emlog:2.5.11:*:*:*:pro:*:*:*",
"matchCriteriaId": "50B7853D-1A2E-4129-8D97-8192A96CCCD8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/404heihei/CVE/issues/5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.310198",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.310198",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.555822",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/404heihei/CVE/issues/5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5137",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-25T00:15:23.257",
"lastModified": "2025-06-03T10:15:22.570",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:33:16.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,86 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7.117:*:*:*:*:*:*:*",
"matchCriteriaId": "67B90F56-9A8F-4B16-9762-1575E7FD95B6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CyberPunk-Infernity/Advisory/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.310218",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.310218",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.571933",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.585711",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/CyberPunk-Infernity/Advisory/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5297",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-28T12:15:20.927",
"lastModified": "2025-05-28T15:01:30.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:33:01.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:razormist:simple_computer_store_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206908BB-1BCC-4675-8556-5A09FC96077C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/byxs0x0/cve/issues/6",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.310421",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.310421",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.585114",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-5334",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-05-29T15:15:34.650",
"lastModified": "2025-06-09T18:15:27.170",
"lastModified": "2025-06-10T19:15:35.243",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of private personal information to an unauthorized actor in the user vaults component of Devolutions Remote Desktop Manager\nallows an authenticated user to gain unauthorized access to private personal information. \n\n\n\nUnder specific circumstances, entries may be unintentionally moved from user vaults to shared vaults when edited by their owners, making them accessible to other users.\n\n\n\n\nThis issue affects the following versions :\n\n * Remote Desktop Manager Windows 2025.1.34.0 and earlier\n * \nRemote Desktop Manager Android 2025.1.3.3 and earlier\n * \nRemote Desktop Manager iOS 2025.1.6.0 and earlier"
"value": "Exposure of private personal information to an unauthorized actor in the user vaults component of Devolutions Remote Desktop Manager\nallows an authenticated user to gain unauthorized access to private personal information. \n\n\n\nUnder specific circumstances, entries may be unintentionally moved from user vaults to shared vaults when edited by their owners, making them accessible to other users.\n\n\n\n\nThis issue affects the following versions :\n\n * Remote Desktop Manager Windows 2025.1.34.0 and earlier\n * \nRemote Desktop Manager macOS 2025.1.16.3 and earlier\n\n\n\n * \nRemote Desktop Manager Android 2025.1.3.3 and earlier\n * \nRemote Desktop Manager iOS 2025.1.6.0 and earlier"
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5610",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-04T21:15:41.400",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:32:53.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,26 +144,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_submitpropertydelete.php.md",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311096",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311096",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.589102",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:codeastro:real_estate_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "64EAEAD6-B0EE-4039-B827-3C243E2058F4"
}
]
}
]
}
],
"references": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_submitpropertydelete.php.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311096",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311096",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.589102",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5611",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-04T21:15:41.577",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:32:30.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,26 +144,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_submitpropertyupdate.php.md",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311097",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311097",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.589103",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:codeastro:real_estate_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "64EAEAD6-B0EE-4039-B827-3C243E2058F4"
}
]
}
]
}
],
"references": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_submitpropertyupdate.php.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311097",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311097",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.589103",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5674",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T19:15:29.627",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:32:07.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,26 +144,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/yuyuchenchen/vuln-pdf/blob/main/0603CVE.pdf",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311162",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311162",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590120",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:patient_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F954A92-51E4-427B-B400-4DCD5500DCC0"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/yuyuchenchen/vuln-pdf/blob/main/0603CVE.pdf",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311162",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311162",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590120",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5675",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T19:15:29.993",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:31:56.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,26 +144,63 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/modestHonK/cve/issues/1",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://vuldb.com/?ctiid.311163",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.311163",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590124",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_teacher_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "441A4AF9-387D-4029-90DE-D10BC69C5989"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/modestHonK/cve/issues/1",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311163",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311163",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590124",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5676",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T19:15:30.247",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:31:48.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,26 +144,63 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/hyx123123/cve/issues/2",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://vuldb.com/?ctiid.311164",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.311164",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590134",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_recruitment_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D9037ECC-11B2-4334-9E4B-0D5349E34D4A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hyx123123/cve/issues/2",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311164",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311164",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590134",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5677",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-05T19:15:30.487",
"lastModified": "2025-06-05T20:12:23.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:31:37.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -124,26 +144,63 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/hyx123123/cve/issues/1",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://vuldb.com/?ctiid.311165",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.311165",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590135",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_recruitment_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D9037ECC-11B2-4334-9E4B-0D5349E34D4A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hyx123123/cve/issues/1",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311165",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311165",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590135",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5726",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T06:15:32.303",
"lastModified": "2025-06-06T14:07:28.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:31:01.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -124,26 +144,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-6-division-field-in-division-system-page",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311246",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311246",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:razormist:student_result_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBD5779-C1BF-4B42-B4B8-79D7DE7729A5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-6-division-field-in-division-system-page",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311246",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311246",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5727",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T07:15:30.657",
"lastModified": "2025-06-06T14:07:28.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:30:49.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -124,26 +144,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-7-title-field-in-announcement-page",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311247",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311247",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:razormist:student_result_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBD5779-C1BF-4B42-B4B8-79D7DE7729A5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-7-title-field-in-announcement-page",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311247",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311247",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5756",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T10:15:25.057",
"lastModified": "2025-06-06T14:07:28.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:30:25.590",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Real Estate Property Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/EditCity.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Real Estate Property Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /Admin/EditCity.php. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -120,30 +144,70 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/Darlingzero2/cve/issues/1",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311299",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311299",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590640",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590641",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8974B5B-08CE-4EDC-8B76-7074DD336CE2"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Darlingzero2/cve/issues/1",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311299",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311299",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590640",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590641",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5757",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T11:15:21.357",
"lastModified": "2025-06-06T14:07:28.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:30:10.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Traffic Offense Reporting System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /save-reported.php. The manipulation of the argument offence_id/vehicle_no/driver_license/name/address/gender/officer_reporting/offence leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Traffic Offense Reporting System 1.0. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /save-reported.php. La manipulaci\u00f3n del argumento offence_id/vehicle_no/driver_license/name/address/gender/officer_reporting/offence provoca Cross Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -120,26 +144,63 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/tuooo/CVE/issues/4",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311300",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311300",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590649",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:carmelogarcia:traffic_offense_reporting_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5597CF2E-19D3-4E97-ACED-EF034C2E8E0F"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/tuooo/CVE/issues/4",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311300",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311300",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590649",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5764",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T13:16:02.073",
"lastModified": "2025-06-06T14:06:58.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:29:57.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Laundry System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /data/insert_laundry.php. The manipulation of the argument Customer leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Laundry System 1.0 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /data/insert_laundry.php. La manipulaci\u00f3n del argumento \"Customer\" provoca Cross Site Scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -120,26 +144,63 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/tuooo/CVE/issues/5",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311306",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311306",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590800",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_laundry_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D396253C-58BC-4B23-9923-281AD83D023D"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/tuooo/CVE/issues/5",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311306",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311306",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590800",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5765",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T13:16:02.500",
"lastModified": "2025-06-06T14:06:58.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:29:44.973",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Laundry System 1.0. It has been classified as problematic. This affects an unknown part of the file /data/edit_laundry.php. The manipulation of the argument Customer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Laundry System 1.0. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo /data/edit_laundry.php. La manipulaci\u00f3n del argumento \"Customer\" provoca ataques de Cross Site Scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -120,26 +144,63 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/tuooo/CVE/issues/6",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311307",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311307",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590809",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_laundry_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D396253C-58BC-4B23-9923-281AD83D023D"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/tuooo/CVE/issues/6",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311307",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311307",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590809",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5766",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T13:16:02.693",
"lastModified": "2025-06-06T14:06:58.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-10T19:29:34.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Laundry System 1.0. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Laundry System 1.0. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n provoca cross-site request forgery. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -120,26 +124,63 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
"nodes": [
{
"url": "https://github.com/tuooo/CVE/issues/7",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?ctiid.311308",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311308",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590851",
"source": "cna@vuldb.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_laundry_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D396253C-58BC-4B23-9923-281AD83D023D"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/tuooo/CVE/issues/7",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311308",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311308",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.590851",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5779",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T15:15:27.177",
"lastModified": "2025-06-09T12:15:47.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:26:20.883",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -122,28 +142,73 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:patient_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A18F6F3-1FDD-4D63-BFB1-6E520B4EAA45"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Thiasap/HCPMS_PHP_vulns/blob/main/sql%20injection%20in%20birthing.php.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311323",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.311323",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.591127",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5780",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T15:15:27.377",
"lastModified": "2025-06-09T13:15:25.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-10T19:26:11.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -122,32 +142,82 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:patient_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A18F6F3-1FDD-4D63-BFB1-6E520B4EAA45"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Thiasap/HCPMS_PHP_vulns/blob/main/sql%20injection%20in%20view_dental.php.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.311324",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.311324",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.591128",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/Thiasap/HCPMS_PHP_vulns/blob/main/sql%20injection%20in%20view_dental.php.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2025-5943",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-06-10T18:15:33.020",
"lastModified": "2025-06-10T18:15:33.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MicroDicom \n\nDICOM Viewer suffers from an out-of-bounds write vulnerability. Remote attackers are able to exploit this issue to potentially execute arbitrary code on affected installations of DICOM Viewer. User interaction is required to exploit the vulnerability in that the user must either visit a malicious website or open a malicious DICOM file locally."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-160-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-5971",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T18:15:33.240",
"lastModified": "2025-06-10T19:15:35.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects School Fees Payment System 1.0. It has been classified as critical. This affects an unknown part of the file /ajx.php. The manipulation of the argument name_startsWith leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/qingchuana/q1ngchuan/issues/6",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311847",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311847",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592339",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592441",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/qingchuana/q1ngchuan/issues/6",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5972",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T19:15:35.537",
"lastModified": "2025-06-10T19:15:35.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/manage-subadmins.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"baseScore": 3.3,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/kakalalaww/CVE/issues/5",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311850",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311850",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592340",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5973",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T19:15:35.727",
"lastModified": "2025-06-10T19:15:35.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in PHPGurukul Restaurant Table Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/add-table.php. The manipulation of the argument tableno leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"baseScore": 3.3,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/kakalalaww/CVE/issues/6",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311851",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311851",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592343",
"source": "cna@vuldb.com"
}
]
}

110
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-10T18:00:23.762324+00:00
2025-06-10T20:00:19.940571+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-10T17:58:18.297000+00:00
2025-06-10T19:43:40.383000+00:00
```
### Last Data Feed Release
@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
297399
297430
```
### CVEs added in the last Commit
Recently added CVEs: `116`
Recently added CVEs: `31`
- [CVE-2025-47168](CVE-2025/CVE-2025-471xx/CVE-2025-47168.json) (`2025-06-10T17:23:43.307`)
- [CVE-2025-47169](CVE-2025/CVE-2025-471xx/CVE-2025-47169.json) (`2025-06-10T17:23:45.317`)
- [CVE-2025-47170](CVE-2025/CVE-2025-471xx/CVE-2025-47170.json) (`2025-06-10T17:23:47.287`)
- [CVE-2025-47171](CVE-2025/CVE-2025-471xx/CVE-2025-47171.json) (`2025-06-10T17:23:49.350`)
- [CVE-2025-47172](CVE-2025/CVE-2025-471xx/CVE-2025-47172.json) (`2025-06-10T17:23:51.607`)
- [CVE-2025-47173](CVE-2025/CVE-2025-471xx/CVE-2025-47173.json) (`2025-06-10T17:23:53.543`)
- [CVE-2025-47174](CVE-2025/CVE-2025-471xx/CVE-2025-47174.json) (`2025-06-10T17:23:55.607`)
- [CVE-2025-47175](CVE-2025/CVE-2025-471xx/CVE-2025-47175.json) (`2025-06-10T17:23:57.607`)
- [CVE-2025-47176](CVE-2025/CVE-2025-471xx/CVE-2025-47176.json) (`2025-06-10T17:23:59.800`)
- [CVE-2025-47953](CVE-2025/CVE-2025-479xx/CVE-2025-47953.json) (`2025-06-10T17:24:01.917`)
- [CVE-2025-47955](CVE-2025/CVE-2025-479xx/CVE-2025-47955.json) (`2025-06-10T17:24:03.870`)
- [CVE-2025-47956](CVE-2025/CVE-2025-479xx/CVE-2025-47956.json) (`2025-06-10T17:24:06.050`)
- [CVE-2025-47957](CVE-2025/CVE-2025-479xx/CVE-2025-47957.json) (`2025-06-10T17:24:08.037`)
- [CVE-2025-47962](CVE-2025/CVE-2025-479xx/CVE-2025-47962.json) (`2025-06-10T17:24:10.140`)
- [CVE-2025-47968](CVE-2025/CVE-2025-479xx/CVE-2025-47968.json) (`2025-06-10T17:24:13.030`)
- [CVE-2025-47969](CVE-2025/CVE-2025-479xx/CVE-2025-47969.json) (`2025-06-10T17:24:15.183`)
- [CVE-2025-47977](CVE-2025/CVE-2025-479xx/CVE-2025-47977.json) (`2025-06-10T17:24:17.200`)
- [CVE-2025-4801](CVE-2025/CVE-2025-48xx/CVE-2025-4801.json) (`2025-06-10T16:15:42.923`)
- [CVE-2025-48067](CVE-2025/CVE-2025-480xx/CVE-2025-48067.json) (`2025-06-10T16:15:41.357`)
- [CVE-2025-48879](CVE-2025/CVE-2025-488xx/CVE-2025-48879.json) (`2025-06-10T16:15:41.513`)
- [CVE-2025-48937](CVE-2025/CVE-2025-489xx/CVE-2025-48937.json) (`2025-06-10T16:15:41.670`)
- [CVE-2025-49142](CVE-2025/CVE-2025-491xx/CVE-2025-49142.json) (`2025-06-10T16:15:42.293`)
- [CVE-2025-49143](CVE-2025/CVE-2025-491xx/CVE-2025-49143.json) (`2025-06-10T16:15:42.450`)
- [CVE-2025-5969](CVE-2025/CVE-2025-59xx/CVE-2025-5969.json) (`2025-06-10T17:25:20.293`)
- [CVE-2025-5970](CVE-2025/CVE-2025-59xx/CVE-2025-5970.json) (`2025-06-10T17:25:24.033`)
- [CVE-2025-2884](CVE-2025/CVE-2025-28xx/CVE-2025-2884.json) (`2025-06-10T18:15:30.617`)
- [CVE-2025-30327](CVE-2025/CVE-2025-303xx/CVE-2025-30327.json) (`2025-06-10T19:15:29.600`)
- [CVE-2025-36574](CVE-2025/CVE-2025-365xx/CVE-2025-36574.json) (`2025-06-10T18:15:30.883`)
- [CVE-2025-36575](CVE-2025/CVE-2025-365xx/CVE-2025-36575.json) (`2025-06-10T18:15:31.060`)
- [CVE-2025-36576](CVE-2025/CVE-2025-365xx/CVE-2025-36576.json) (`2025-06-10T18:15:31.217`)
- [CVE-2025-36577](CVE-2025/CVE-2025-365xx/CVE-2025-36577.json) (`2025-06-10T18:15:31.363`)
- [CVE-2025-36578](CVE-2025/CVE-2025-365xx/CVE-2025-36578.json) (`2025-06-10T18:15:31.513`)
- [CVE-2025-36580](CVE-2025/CVE-2025-365xx/CVE-2025-36580.json) (`2025-06-10T18:15:31.660`)
- [CVE-2025-43550](CVE-2025/CVE-2025-435xx/CVE-2025-43550.json) (`2025-06-10T19:15:32.120`)
- [CVE-2025-43573](CVE-2025/CVE-2025-435xx/CVE-2025-43573.json) (`2025-06-10T19:15:32.273`)
- [CVE-2025-43574](CVE-2025/CVE-2025-435xx/CVE-2025-43574.json) (`2025-06-10T19:15:32.427`)
- [CVE-2025-43575](CVE-2025/CVE-2025-435xx/CVE-2025-43575.json) (`2025-06-10T19:15:32.570`)
- [CVE-2025-43576](CVE-2025/CVE-2025-435xx/CVE-2025-43576.json) (`2025-06-10T19:15:32.723`)
- [CVE-2025-43577](CVE-2025/CVE-2025-435xx/CVE-2025-43577.json) (`2025-06-10T19:15:32.893`)
- [CVE-2025-43578](CVE-2025/CVE-2025-435xx/CVE-2025-43578.json) (`2025-06-10T19:15:33.050`)
- [CVE-2025-43579](CVE-2025/CVE-2025-435xx/CVE-2025-43579.json) (`2025-06-10T19:15:33.200`)
- [CVE-2025-43581](CVE-2025/CVE-2025-435xx/CVE-2025-43581.json) (`2025-06-10T18:15:31.807`)
- [CVE-2025-43588](CVE-2025/CVE-2025-435xx/CVE-2025-43588.json) (`2025-06-10T18:15:32.063`)
- [CVE-2025-47107](CVE-2025/CVE-2025-471xx/CVE-2025-47107.json) (`2025-06-10T19:15:33.347`)
- [CVE-2025-47111](CVE-2025/CVE-2025-471xx/CVE-2025-47111.json) (`2025-06-10T19:15:33.507`)
- [CVE-2025-47112](CVE-2025/CVE-2025-471xx/CVE-2025-47112.json) (`2025-06-10T19:15:33.667`)
- [CVE-2025-5943](CVE-2025/CVE-2025-59xx/CVE-2025-5943.json) (`2025-06-10T18:15:33.020`)
- [CVE-2025-5971](CVE-2025/CVE-2025-59xx/CVE-2025-5971.json) (`2025-06-10T18:15:33.240`)
- [CVE-2025-5972](CVE-2025/CVE-2025-59xx/CVE-2025-5972.json) (`2025-06-10T19:15:35.537`)
- [CVE-2025-5973](CVE-2025/CVE-2025-59xx/CVE-2025-5973.json) (`2025-06-10T19:15:35.727`)
### CVEs modified in the last Commit
Recently modified CVEs: `70`
Recently modified CVEs: `49`
- [CVE-2025-43701](CVE-2025/CVE-2025-437xx/CVE-2025-43701.json) (`2025-06-10T16:15:40.667`)
- [CVE-2025-46178](CVE-2025/CVE-2025-461xx/CVE-2025-46178.json) (`2025-06-10T16:15:41.050`)
- [CVE-2025-48432](CVE-2025/CVE-2025-484xx/CVE-2025-48432.json) (`2025-06-10T17:24:19.100`)
- [CVE-2025-49137](CVE-2025/CVE-2025-491xx/CVE-2025-49137.json) (`2025-06-10T16:15:41.880`)
- [CVE-2025-49138](CVE-2025/CVE-2025-491xx/CVE-2025-49138.json) (`2025-06-10T16:15:41.983`)
- [CVE-2025-49139](CVE-2025/CVE-2025-491xx/CVE-2025-49139.json) (`2025-06-10T16:15:42.090`)
- [CVE-2025-49141](CVE-2025/CVE-2025-491xx/CVE-2025-49141.json) (`2025-06-10T16:15:42.193`)
- [CVE-2025-5895](CVE-2025/CVE-2025-58xx/CVE-2025-5895.json) (`2025-06-10T16:15:43.003`)
- [CVE-2025-5896](CVE-2025/CVE-2025-58xx/CVE-2025-5896.json) (`2025-06-10T16:15:43.133`)
- [CVE-2025-5897](CVE-2025/CVE-2025-58xx/CVE-2025-5897.json) (`2025-06-10T16:15:43.257`)
- [CVE-2025-5898](CVE-2025/CVE-2025-58xx/CVE-2025-5898.json) (`2025-06-10T16:15:43.380`)
- [CVE-2025-5899](CVE-2025/CVE-2025-58xx/CVE-2025-5899.json) (`2025-06-10T16:15:43.510`)
- [CVE-2025-5900](CVE-2025/CVE-2025-59xx/CVE-2025-5900.json) (`2025-06-10T16:15:43.627`)
- [CVE-2025-5901](CVE-2025/CVE-2025-59xx/CVE-2025-5901.json) (`2025-06-10T16:15:43.753`)
- [CVE-2025-5902](CVE-2025/CVE-2025-59xx/CVE-2025-5902.json) (`2025-06-10T16:15:43.877`)
- [CVE-2025-5903](CVE-2025/CVE-2025-59xx/CVE-2025-5903.json) (`2025-06-10T16:15:44.000`)
- [CVE-2025-5904](CVE-2025/CVE-2025-59xx/CVE-2025-5904.json) (`2025-06-10T16:15:44.140`)
- [CVE-2025-5905](CVE-2025/CVE-2025-59xx/CVE-2025-5905.json) (`2025-06-10T16:15:44.870`)
- [CVE-2025-5906](CVE-2025/CVE-2025-59xx/CVE-2025-5906.json) (`2025-06-10T16:15:44.993`)
- [CVE-2025-5907](CVE-2025/CVE-2025-59xx/CVE-2025-5907.json) (`2025-06-10T16:15:45.127`)
- [CVE-2025-5908](CVE-2025/CVE-2025-59xx/CVE-2025-5908.json) (`2025-06-10T16:15:45.247`)
- [CVE-2025-5909](CVE-2025/CVE-2025-59xx/CVE-2025-5909.json) (`2025-06-10T16:15:45.370`)
- [CVE-2025-5910](CVE-2025/CVE-2025-59xx/CVE-2025-5910.json) (`2025-06-10T16:15:45.490`)
- [CVE-2025-5914](CVE-2025/CVE-2025-59xx/CVE-2025-5914.json) (`2025-06-10T16:15:45.610`)
- [CVE-2025-5952](CVE-2025/CVE-2025-59xx/CVE-2025-5952.json) (`2025-06-10T16:15:45.717`)
- [CVE-2025-44040](CVE-2025/CVE-2025-440xx/CVE-2025-44040.json) (`2025-06-10T19:34:47.497`)
- [CVE-2025-45753](CVE-2025/CVE-2025-457xx/CVE-2025-45753.json) (`2025-06-10T19:34:41.410`)
- [CVE-2025-45755](CVE-2025/CVE-2025-457xx/CVE-2025-45755.json) (`2025-06-10T19:34:54.193`)
- [CVE-2025-47176](CVE-2025/CVE-2025-471xx/CVE-2025-47176.json) (`2025-06-10T18:15:32.510`)
- [CVE-2025-48432](CVE-2025/CVE-2025-484xx/CVE-2025-48432.json) (`2025-06-10T18:15:32.790`)
- [CVE-2025-5053](CVE-2025/CVE-2025-50xx/CVE-2025-5053.json) (`2025-06-10T19:34:33.830`)
- [CVE-2025-5119](CVE-2025/CVE-2025-51xx/CVE-2025-5119.json) (`2025-06-10T19:34:07.790`)
- [CVE-2025-5137](CVE-2025/CVE-2025-51xx/CVE-2025-5137.json) (`2025-06-10T19:33:16.710`)
- [CVE-2025-5297](CVE-2025/CVE-2025-52xx/CVE-2025-5297.json) (`2025-06-10T19:33:01.990`)
- [CVE-2025-5334](CVE-2025/CVE-2025-53xx/CVE-2025-5334.json) (`2025-06-10T19:15:35.243`)
- [CVE-2025-5610](CVE-2025/CVE-2025-56xx/CVE-2025-5610.json) (`2025-06-10T19:32:53.453`)
- [CVE-2025-5611](CVE-2025/CVE-2025-56xx/CVE-2025-5611.json) (`2025-06-10T19:32:30.077`)
- [CVE-2025-5674](CVE-2025/CVE-2025-56xx/CVE-2025-5674.json) (`2025-06-10T19:32:07.543`)
- [CVE-2025-5675](CVE-2025/CVE-2025-56xx/CVE-2025-5675.json) (`2025-06-10T19:31:56.573`)
- [CVE-2025-5676](CVE-2025/CVE-2025-56xx/CVE-2025-5676.json) (`2025-06-10T19:31:48.510`)
- [CVE-2025-5677](CVE-2025/CVE-2025-56xx/CVE-2025-5677.json) (`2025-06-10T19:31:37.290`)
- [CVE-2025-5726](CVE-2025/CVE-2025-57xx/CVE-2025-5726.json) (`2025-06-10T19:31:01.250`)
- [CVE-2025-5727](CVE-2025/CVE-2025-57xx/CVE-2025-5727.json) (`2025-06-10T19:30:49.890`)
- [CVE-2025-5756](CVE-2025/CVE-2025-57xx/CVE-2025-5756.json) (`2025-06-10T19:30:25.590`)
- [CVE-2025-5757](CVE-2025/CVE-2025-57xx/CVE-2025-5757.json) (`2025-06-10T19:30:10.510`)
- [CVE-2025-5764](CVE-2025/CVE-2025-57xx/CVE-2025-5764.json) (`2025-06-10T19:29:57.893`)
- [CVE-2025-5765](CVE-2025/CVE-2025-57xx/CVE-2025-5765.json) (`2025-06-10T19:29:44.973`)
- [CVE-2025-5766](CVE-2025/CVE-2025-57xx/CVE-2025-5766.json) (`2025-06-10T19:29:34.820`)
- [CVE-2025-5779](CVE-2025/CVE-2025-57xx/CVE-2025-5779.json) (`2025-06-10T19:26:20.883`)
- [CVE-2025-5780](CVE-2025/CVE-2025-57xx/CVE-2025-5780.json) (`2025-06-10T19:26:11.937`)
## Download and Usage

File diff suppressed because it is too large Load Diff