mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-06-25T20:00:27.105153+00:00
This commit is contained in:
parent
81a9cb824e
commit
baf106c47a
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44915",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-25T17:15:36.323",
|
||||
"lastModified": "2025-06-25T17:15:36.323",
|
||||
"lastModified": "2025-06-25T18:15:21.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the component /Login.php of c3crm up to v3.0.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the login_error parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://c3crm.com",
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-18T20:15:15.913",
|
||||
"lastModified": "2025-04-22T14:15:24.613",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-18T20:15:16.137",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-18T20:15:16.240",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-18T20:15:16.347",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
60
CVE-2025/CVE-2025-453xx/CVE-2025-45332.json
Normal file
60
CVE-2025/CVE-2025-453xx/CVE-2025-45332.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-45332",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-25T18:15:22.040",
|
||||
"lastModified": "2025-06-25T19:15:23.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "vkoskiv c-ray 1.1 contains a Null Pointer Dereference (NPD) vulnerability in the parse_mtllib function of its data processing module, leading to unpredictable program behavior, causing segmentation faults, and program crashes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/QiuYitai/6ebfa07510828a9464ba7fb948255ed5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vkoskiv/c-ray/issues/119",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49549.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49549.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49549",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-06-25T18:15:22.163",
|
||||
"lastModified": "2025-06-25T18:15:22.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A high-privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized access. Exploitation of this issue does not require user interaction."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49550.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49550.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49550",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-06-25T18:15:22.323",
|
||||
"lastModified": "2025-06-25T18:15:22.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized access. Exploitation of this issue requires user interaction."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/magento/apsb25-50.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-52576",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-25T17:15:39.023",
|
||||
"lastModified": "2025-06-25T17:15:39.023",
|
||||
"lastModified": "2025-06-25T18:15:22.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,10 @@
|
||||
{
|
||||
"url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-qw57-7cx6-wvp7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-qw57-7cx6-wvp7",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-52875",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-06-23T15:15:28.260",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:30:15.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2025.03.3 a DOM-based XSS at the Performance Monitor page was possible"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En JetBrains TeamCity antes de 2025.03.3 era posible un XSS basado en DOM en la p\u00e1gina del Monitor de rendimiento"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03.3",
|
||||
"matchCriteriaId": "4C27AC44-E711-4B67-86F8-8A45ED7A29C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-52876",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-06-23T15:15:28.447",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:30:24.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2025.03.3 reflected XSS on the favoriteIcon page was possible"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En JetBrains TeamCity antes del 3/03/2025 era posible XSS reflejado en la p\u00e1gina favoriteIcon "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03.3",
|
||||
"matchCriteriaId": "4C27AC44-E711-4B67-86F8-8A45ED7A29C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-52877",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-06-23T15:15:28.603",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:30:30.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2025.03.3 reflected XSS on diskUsageBuildsStats page was possible"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En JetBrains TeamCity antes de 2025.03.3 era posible XSS reflejado en la p\u00e1gina diskUsageBuildsStats"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03.3",
|
||||
"matchCriteriaId": "4C27AC44-E711-4B67-86F8-8A45ED7A29C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-52878",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-06-23T15:15:28.770",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:28:34.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2025.03.3 usernames were exposed to the users without proper permissions"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En JetBrains TeamCity antes del 3/03/2025, los nombres de usuario estaban expuestos a usuarios sin los permisos adecuados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03.3",
|
||||
"matchCriteriaId": "4C27AC44-E711-4B67-86F8-8A45ED7A29C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-52879",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-06-23T15:15:28.933",
|
||||
"lastModified": "2025-06-24T15:15:25.180",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-25T19:28:19.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2025.03.3 reflected XSS in the NPM Registry integration was possible"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En JetBrains TeamCity antes del 3/03/2025 era posible la integraci\u00f3n de XSS reflejado en el Registro NPM"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,10 +61,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03.3",
|
||||
"matchCriteriaId": "4C27AC44-E711-4B67-86F8-8A45ED7A29C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-52889",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-25T17:15:39.200",
|
||||
"lastModified": "2025-06-25T17:15:39.200",
|
||||
"lastModified": "2025-06-25T18:15:22.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/lxc/incus/security/advisories/GHSA-9q7c-qmhm-jv86",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lxc/incus/security/advisories/GHSA-9q7c-qmhm-jv86",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-52890",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-25T17:15:39.370",
|
||||
"lastModified": "2025-06-25T17:15:39.370",
|
||||
"lastModified": "2025-06-25T18:15:22.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://github.com/lxc/incus/security/advisories/GHSA-p7fw-vjjm-2rwp",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lxc/incus/security/advisories/GHSA-p7fw-vjjm-2rwp",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5822.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5822.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5822",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:22.900",
|
||||
"lastModified": "2025-06-25T18:15:22.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial Technician API Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. An attacker must first obtain a low-privileged authorization token in order to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the Autel Technician API. The issue results from incorrect authorization. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-26325."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-340/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5823.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5823.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5823",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:23.043",
|
||||
"lastModified": "2025-06-25T18:15:23.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial Serial Number Exposed Dangerous Method Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the Autel Technician API. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-26351."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-749"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-341/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5824.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5824.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5824",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:23.173",
|
||||
"lastModified": "2025-06-25T18:15:23.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial Origin Validation Error Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Autel MaxiCharger AC Wallbox Commercial. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the handling of bluetooth pairing requests. The issue results from insufficient validation of the origin of commands. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26353."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-343/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5825.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5825.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5825",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:23.303",
|
||||
"lastModified": "2025-06-25T18:15:23.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial Firmware Downgrade Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a firmware image before using it to perform an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26354."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1328"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-344/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5826.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5826.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5826",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:23.433",
|
||||
"lastModified": "2025-06-25T18:15:23.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial ble_process_esp32_msg Misinterpretation of Input Vulnerability. This vulnerability allows network-adjacent attackers to inject arbitrary AT commands on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the ble_process_esp32_msg function. The issue results from misinterpretation of input data. An attacker can leverage this vulnerability to execute AT commands in the context of the device. Was ZDI-CAN-26368."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-115"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-345/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5827.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5827.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5827",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:23.563",
|
||||
"lastModified": "2025-06-25T18:15:23.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial ble_process_esp32_msg Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the ble_process_esp32_msg function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26369."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-346/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5828.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5828.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5828",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:23.683",
|
||||
"lastModified": "2025-06-25T18:15:23.683",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-347/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5829.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5829.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5829",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:23.817",
|
||||
"lastModified": "2025-06-25T18:15:23.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of JSON messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26330."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-348/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5830.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5830.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5830",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:23.950",
|
||||
"lastModified": "2025-06-25T18:15:23.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial DLB_SlaveRegister Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of DLB_SlaveRegister messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26327."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-349/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5832.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5832.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5832",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:24.077",
|
||||
"lastModified": "2025-06-25T18:15:24.077",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pioneer DMH-WT7600NEX Software Update Signing Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the software update verification process. The issue results from the lack of validating all the data in the software update. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26079."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-352/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5833.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5833.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5833",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:24.203",
|
||||
"lastModified": "2025-06-25T18:15:24.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pioneer DMH-WT7600NEX Root Filesystem Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of the operating system. The issue results from the lack of properly configured protection for the root file system. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26077."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-350/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-58xx/CVE-2025-5834.json
Normal file
56
CVE-2025/CVE-2025-58xx/CVE-2025-5834.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-5834",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:24.337",
|
||||
"lastModified": "2025-06-25T18:15:24.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pioneer DMH-WT7600NEX Missing Immutable Root of Trust in Hardware Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to bypass authentication on affected installations of Pioneer DMH-WT7600NEX devices. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the configuration of the application system-on-chip (SoC). The issue results from the lack of a properly configured hardware root of trust. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the boot process. Was ZDI-CAN-26078."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1326"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-351/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6218",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-21T01:15:29.123",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:03:33.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.12",
|
||||
"matchCriteriaId": "E5B3E0ED-B444-468E-804E-7664C75CE9EA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.win-rar.com/singlenewsview.html?&tx_ttnews%5Btt_news%5D=276&cHash=388885bd3908a40726f535c026f94eb6",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-409/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6421",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T22:15:21.870",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:50:23.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,34 +144,76 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61BF42C7-3A62-4829-9CFE-E7522E8E62CC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zzb1388/cve/issues/7",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313415",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313415",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598247",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598584",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zzb1388/cve/issues/7",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6422",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-21T23:15:24.563",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:49:55.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_recruitment_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9037ECC-11B2-4334-9E4B-0D5349E34D4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sp1d3rL1/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313417",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313417",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.598211",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Sp1d3rL1/CVE/issues/2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-64xx/CVE-2025-6444.json
Normal file
56
CVE-2025/CVE-2025-64xx/CVE-2025-6444.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-6444",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:24.463",
|
||||
"lastModified": "2025-06-25T18:15:24.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ServiceStack GetErrorResponse Improper Input Validation NTLM Relay Vulnerability. This vulnerability allows remote attackers to relay NTLM credentials on affected installations of ServiceStack. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the implementation of the GetErrorResponse method. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to relay NTLM credentials in the context of the current user. Was ZDI-CAN-25834."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-415/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-64xx/CVE-2025-6445.json
Normal file
60
CVE-2025/CVE-2025-64xx/CVE-2025-6445.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-6445",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:24.610",
|
||||
"lastModified": "2025-06-25T18:15:24.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ServiceStack FindType Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ServiceStack. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the implementation of the FindType method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25837."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.servicestack.net/releases/v8_06#reported-vulnerabilities",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-416/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6473",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T11:15:19.517",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:27:31.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabian:school_fees_payment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA0F147-F254-4156-BAB0-6D889FEEEC1C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tuooo/CVE/issues/17",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313581",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313581",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.599888",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6477",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T13:15:35.120",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:25:44.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,82 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:razormist:student_result_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FBD5779-C1BF-4B42-B4B8-79D7DE7729A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README9.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313585",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313585",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600559",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README9.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6479",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T14:15:22.193",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:19:01.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:carmelo:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9EC497F-6085-4BEA-90C3-F623DCCFE901"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313587",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313587",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600683",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6480",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T15:15:20.030",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:18:18.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:carmelo:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9EC497F-6085-4BEA-90C3-F623DCCFE901"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313588",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313588",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600684",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6481",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T15:15:20.830",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:17:25.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:carmelo:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9EC497F-6085-4BEA-90C3-F623DCCFE901"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313589",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313589",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600685",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6482",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T16:15:24.093",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:05:40.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:carmelo:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9EC497F-6085-4BEA-90C3-F623DCCFE901"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313590",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313590",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600689",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6483",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T16:15:24.290",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:01:58.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:carmelo:simple_pizza_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9EC497F-6085-4BEA-90C3-F623DCCFE901"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/5",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313591",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313591",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600690",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6485",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T17:15:23.043",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:31:46.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,26 +124,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3200r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB8E241D-0737-4231-B84C-494D4AE951EE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3200r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4E1F700-0B06-4951-BD60-F901E6E9C384"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_34/34.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313593",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313593",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600727",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6486",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T18:15:22.573",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:31:37.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,26 +124,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3200r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB8E241D-0737-4231-B84C-494D4AE951EE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3200r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4E1F700-0B06-4951-BD60-F901E6E9C384"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313594",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313594",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600728",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6487",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T18:15:22.783",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:31:27.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,26 +124,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3200r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB8E241D-0737-4231-B84C-494D4AE951EE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3200r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4E1F700-0B06-4951-BD60-F901E6E9C384"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313595",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313595",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.600729",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6489",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-22T19:15:19.843",
|
||||
"lastModified": "2025-06-23T20:16:21.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-25T19:31:16.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,26 +144,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adonesevangelista:agri-trading_online_shopping_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FF6E7DA-95E8-4320-8A3D-CDAD62BE7429"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ltranquility/CVE/issues/13",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313600",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313600",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.601190",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
157
CVE-2025/CVE-2025-66xx/CVE-2025-6618.json
Normal file
157
CVE-2025/CVE-2025-66xx/CVE-2025-6618.json
Normal file
@ -0,0 +1,157 @@
|
||||
{
|
||||
"id": "CVE-2025-6618",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-25T18:15:24.757",
|
||||
"lastModified": "2025-06-25T18:15:24.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as critical. Affected is the function SetWLanApcliSettings of the file wps.so. The manipulation of the argument PIN leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313836",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313836",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.602263",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md#poc",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
157
CVE-2025/CVE-2025-66xx/CVE-2025-6619.json
Normal file
157
CVE-2025/CVE-2025-66xx/CVE-2025-6619.json
Normal file
@ -0,0 +1,157 @@
|
||||
{
|
||||
"id": "CVE-2025-6619",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-25T18:15:24.950",
|
||||
"lastModified": "2025-06-25T18:15:24.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared as critical. Affected by this vulnerability is the function setUpgradeFW of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313837",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313837",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.602264",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md#poc",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2025/CVE-2025-66xx/CVE-2025-6620.json
Normal file
149
CVE-2025/CVE-2025-66xx/CVE-2025-6620.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2025-6620",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-25T18:15:25.137",
|
||||
"lastModified": "2025-06-25T18:15:25.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313838",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313838",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.602265",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2025/CVE-2025-66xx/CVE-2025-6621.json
Normal file
149
CVE-2025/CVE-2025-66xx/CVE-2025-6621.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2025-6621",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-25T18:15:25.310",
|
||||
"lastModified": "2025-06-25T18:15:25.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c.884. This affects the function QuickSetting of the file ap.so. The manipulation of the argument hour/minute leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313839",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313839",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.602266",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2025/CVE-2025-66xx/CVE-2025-6627.json
Normal file
149
CVE-2025/CVE-2025-66xx/CVE-2025-6627.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2025-6627",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-25T19:15:24.260",
|
||||
"lastModified": "2025-06-25T19:15:24.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in TOTOLINK A702R 4.0.0-B20230721.1521 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formIpv6Setup of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/d2pq/cve/blob/main/616/24.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/d2pq/cve/blob/main/616/24.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313852",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313852",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.602292",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-66xx/CVE-2025-6678.json
Normal file
56
CVE-2025/CVE-2025-66xx/CVE-2025-6678.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-6678",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-06-25T18:15:25.507",
|
||||
"lastModified": "2025-06-25T18:15:25.507",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Autel MaxiCharger AC Wallbox Commercial PIN Missing Authentication Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Pile API. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-26352."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-342/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-25T18:00:27.527282+00:00
|
||||
2025-06-25T20:00:27.105153+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-25T17:15:40.507000+00:00
|
||||
2025-06-25T19:50:23.227000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,47 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
299324
|
||||
299347
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `32`
|
||||
Recently added CVEs: `23`
|
||||
|
||||
- [CVE-2025-4656](CVE-2025/CVE-2025-46xx/CVE-2025-4656.json) (`2025-06-25T17:15:38.440`)
|
||||
- [CVE-2025-49151](CVE-2025/CVE-2025-491xx/CVE-2025-49151.json) (`2025-06-25T17:15:37.897`)
|
||||
- [CVE-2025-49152](CVE-2025/CVE-2025-491xx/CVE-2025-49152.json) (`2025-06-25T17:15:38.100`)
|
||||
- [CVE-2025-49153](CVE-2025/CVE-2025-491xx/CVE-2025-49153.json) (`2025-06-25T17:15:38.263`)
|
||||
- [CVE-2025-49845](CVE-2025/CVE-2025-498xx/CVE-2025-49845.json) (`2025-06-25T16:15:26.533`)
|
||||
- [CVE-2025-5015](CVE-2025/CVE-2025-50xx/CVE-2025-5015.json) (`2025-06-25T17:15:39.970`)
|
||||
- [CVE-2025-50178](CVE-2025/CVE-2025-501xx/CVE-2025-50178.json) (`2025-06-25T16:15:26.693`)
|
||||
- [CVE-2025-50179](CVE-2025/CVE-2025-501xx/CVE-2025-50179.json) (`2025-06-25T16:15:26.843`)
|
||||
- [CVE-2025-52479](CVE-2025/CVE-2025-524xx/CVE-2025-52479.json) (`2025-06-25T16:15:27.017`)
|
||||
- [CVE-2025-52480](CVE-2025/CVE-2025-524xx/CVE-2025-52480.json) (`2025-06-25T17:15:38.590`)
|
||||
- [CVE-2025-52483](CVE-2025/CVE-2025-524xx/CVE-2025-52483.json) (`2025-06-25T17:15:38.740`)
|
||||
- [CVE-2025-52569](CVE-2025/CVE-2025-525xx/CVE-2025-52569.json) (`2025-06-25T17:15:38.883`)
|
||||
- [CVE-2025-52576](CVE-2025/CVE-2025-525xx/CVE-2025-52576.json) (`2025-06-25T17:15:39.023`)
|
||||
- [CVE-2025-52889](CVE-2025/CVE-2025-528xx/CVE-2025-52889.json) (`2025-06-25T17:15:39.200`)
|
||||
- [CVE-2025-52890](CVE-2025/CVE-2025-528xx/CVE-2025-52890.json) (`2025-06-25T17:15:39.370`)
|
||||
- [CVE-2025-52893](CVE-2025/CVE-2025-528xx/CVE-2025-52893.json) (`2025-06-25T17:15:39.523`)
|
||||
- [CVE-2025-52894](CVE-2025/CVE-2025-528xx/CVE-2025-52894.json) (`2025-06-25T17:15:39.677`)
|
||||
- [CVE-2025-52999](CVE-2025/CVE-2025-529xx/CVE-2025-52999.json) (`2025-06-25T17:15:39.820`)
|
||||
- [CVE-2025-6442](CVE-2025/CVE-2025-64xx/CVE-2025-6442.json) (`2025-06-25T17:15:40.117`)
|
||||
- [CVE-2025-6611](CVE-2025/CVE-2025-66xx/CVE-2025-6611.json) (`2025-06-25T16:15:27.233`)
|
||||
- [CVE-2025-6612](CVE-2025/CVE-2025-66xx/CVE-2025-6612.json) (`2025-06-25T16:15:27.413`)
|
||||
- [CVE-2025-6614](CVE-2025/CVE-2025-66xx/CVE-2025-6614.json) (`2025-06-25T16:15:27.593`)
|
||||
- [CVE-2025-6615](CVE-2025/CVE-2025-66xx/CVE-2025-6615.json) (`2025-06-25T16:15:27.790`)
|
||||
- [CVE-2025-6616](CVE-2025/CVE-2025-66xx/CVE-2025-6616.json) (`2025-06-25T17:15:40.280`)
|
||||
- [CVE-2025-6617](CVE-2025/CVE-2025-66xx/CVE-2025-6617.json) (`2025-06-25T17:15:40.507`)
|
||||
- [CVE-2025-45332](CVE-2025/CVE-2025-453xx/CVE-2025-45332.json) (`2025-06-25T18:15:22.040`)
|
||||
- [CVE-2025-49549](CVE-2025/CVE-2025-495xx/CVE-2025-49549.json) (`2025-06-25T18:15:22.163`)
|
||||
- [CVE-2025-49550](CVE-2025/CVE-2025-495xx/CVE-2025-49550.json) (`2025-06-25T18:15:22.323`)
|
||||
- [CVE-2025-5822](CVE-2025/CVE-2025-58xx/CVE-2025-5822.json) (`2025-06-25T18:15:22.900`)
|
||||
- [CVE-2025-5823](CVE-2025/CVE-2025-58xx/CVE-2025-5823.json) (`2025-06-25T18:15:23.043`)
|
||||
- [CVE-2025-5824](CVE-2025/CVE-2025-58xx/CVE-2025-5824.json) (`2025-06-25T18:15:23.173`)
|
||||
- [CVE-2025-5825](CVE-2025/CVE-2025-58xx/CVE-2025-5825.json) (`2025-06-25T18:15:23.303`)
|
||||
- [CVE-2025-5826](CVE-2025/CVE-2025-58xx/CVE-2025-5826.json) (`2025-06-25T18:15:23.433`)
|
||||
- [CVE-2025-5827](CVE-2025/CVE-2025-58xx/CVE-2025-5827.json) (`2025-06-25T18:15:23.563`)
|
||||
- [CVE-2025-5828](CVE-2025/CVE-2025-58xx/CVE-2025-5828.json) (`2025-06-25T18:15:23.683`)
|
||||
- [CVE-2025-5829](CVE-2025/CVE-2025-58xx/CVE-2025-5829.json) (`2025-06-25T18:15:23.817`)
|
||||
- [CVE-2025-5830](CVE-2025/CVE-2025-58xx/CVE-2025-5830.json) (`2025-06-25T18:15:23.950`)
|
||||
- [CVE-2025-5832](CVE-2025/CVE-2025-58xx/CVE-2025-5832.json) (`2025-06-25T18:15:24.077`)
|
||||
- [CVE-2025-5833](CVE-2025/CVE-2025-58xx/CVE-2025-5833.json) (`2025-06-25T18:15:24.203`)
|
||||
- [CVE-2025-5834](CVE-2025/CVE-2025-58xx/CVE-2025-5834.json) (`2025-06-25T18:15:24.337`)
|
||||
- [CVE-2025-6444](CVE-2025/CVE-2025-64xx/CVE-2025-6444.json) (`2025-06-25T18:15:24.463`)
|
||||
- [CVE-2025-6445](CVE-2025/CVE-2025-64xx/CVE-2025-6445.json) (`2025-06-25T18:15:24.610`)
|
||||
- [CVE-2025-6618](CVE-2025/CVE-2025-66xx/CVE-2025-6618.json) (`2025-06-25T18:15:24.757`)
|
||||
- [CVE-2025-6619](CVE-2025/CVE-2025-66xx/CVE-2025-6619.json) (`2025-06-25T18:15:24.950`)
|
||||
- [CVE-2025-6620](CVE-2025/CVE-2025-66xx/CVE-2025-6620.json) (`2025-06-25T18:15:25.137`)
|
||||
- [CVE-2025-6621](CVE-2025/CVE-2025-66xx/CVE-2025-6621.json) (`2025-06-25T18:15:25.310`)
|
||||
- [CVE-2025-6627](CVE-2025/CVE-2025-66xx/CVE-2025-6627.json) (`2025-06-25T19:15:24.260`)
|
||||
- [CVE-2025-6678](CVE-2025/CVE-2025-66xx/CVE-2025-6678.json) (`2025-06-25T18:15:25.507`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `27`
|
||||
|
||||
- [CVE-2024-27685](CVE-2024/CVE-2024-276xx/CVE-2024-27685.json) (`2025-06-25T16:15:25.390`)
|
||||
- [CVE-2025-24814](CVE-2025/CVE-2025-248xx/CVE-2025-24814.json) (`2025-02-15T01:15:11.157`)
|
||||
- [CVE-2025-48957](CVE-2025/CVE-2025-489xx/CVE-2025-48957.json) (`2025-06-02T17:32:17.397`)
|
||||
- [CVE-2025-25983](CVE-2025/CVE-2025-259xx/CVE-2025-25983.json) (`2025-04-21T14:23:45.950`)
|
||||
- [CVE-2025-25984](CVE-2025/CVE-2025-259xx/CVE-2025-25984.json) (`2025-04-21T14:23:45.950`)
|
||||
- [CVE-2025-25985](CVE-2025/CVE-2025-259xx/CVE-2025-25985.json) (`2025-04-21T14:23:45.950`)
|
||||
- [CVE-2025-52576](CVE-2025/CVE-2025-525xx/CVE-2025-52576.json) (`2025-06-25T18:15:22.537`)
|
||||
- [CVE-2025-52875](CVE-2025/CVE-2025-528xx/CVE-2025-52875.json) (`2025-06-25T19:30:15.433`)
|
||||
- [CVE-2025-52876](CVE-2025/CVE-2025-528xx/CVE-2025-52876.json) (`2025-06-25T19:30:24.007`)
|
||||
- [CVE-2025-52877](CVE-2025/CVE-2025-528xx/CVE-2025-52877.json) (`2025-06-25T19:30:30.747`)
|
||||
- [CVE-2025-52878](CVE-2025/CVE-2025-528xx/CVE-2025-52878.json) (`2025-06-25T19:28:34.493`)
|
||||
- [CVE-2025-52879](CVE-2025/CVE-2025-528xx/CVE-2025-52879.json) (`2025-06-25T19:28:19.253`)
|
||||
- [CVE-2025-52889](CVE-2025/CVE-2025-528xx/CVE-2025-52889.json) (`2025-06-25T18:15:22.653`)
|
||||
- [CVE-2025-52890](CVE-2025/CVE-2025-528xx/CVE-2025-52890.json) (`2025-06-25T18:15:22.753`)
|
||||
- [CVE-2025-6218](CVE-2025/CVE-2025-62xx/CVE-2025-6218.json) (`2025-06-25T19:03:33.817`)
|
||||
- [CVE-2025-6421](CVE-2025/CVE-2025-64xx/CVE-2025-6421.json) (`2025-06-25T19:50:23.227`)
|
||||
- [CVE-2025-6422](CVE-2025/CVE-2025-64xx/CVE-2025-6422.json) (`2025-06-25T19:49:55.057`)
|
||||
- [CVE-2025-6473](CVE-2025/CVE-2025-64xx/CVE-2025-6473.json) (`2025-06-25T19:27:31.730`)
|
||||
- [CVE-2025-6477](CVE-2025/CVE-2025-64xx/CVE-2025-6477.json) (`2025-06-25T19:25:44.190`)
|
||||
- [CVE-2025-6479](CVE-2025/CVE-2025-64xx/CVE-2025-6479.json) (`2025-06-25T19:19:01.967`)
|
||||
- [CVE-2025-6480](CVE-2025/CVE-2025-64xx/CVE-2025-6480.json) (`2025-06-25T19:18:18.497`)
|
||||
- [CVE-2025-6481](CVE-2025/CVE-2025-64xx/CVE-2025-6481.json) (`2025-06-25T19:17:25.407`)
|
||||
- [CVE-2025-6482](CVE-2025/CVE-2025-64xx/CVE-2025-6482.json) (`2025-06-25T19:05:40.337`)
|
||||
- [CVE-2025-6483](CVE-2025/CVE-2025-64xx/CVE-2025-6483.json) (`2025-06-25T19:01:58.797`)
|
||||
- [CVE-2025-6485](CVE-2025/CVE-2025-64xx/CVE-2025-6485.json) (`2025-06-25T19:31:46.050`)
|
||||
- [CVE-2025-6486](CVE-2025/CVE-2025-64xx/CVE-2025-6486.json) (`2025-06-25T19:31:37.533`)
|
||||
- [CVE-2025-6487](CVE-2025/CVE-2025-64xx/CVE-2025-6487.json) (`2025-06-25T19:31:27.433`)
|
||||
- [CVE-2025-6489](CVE-2025/CVE-2025-64xx/CVE-2025-6489.json) (`2025-06-25T19:31:16.637`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
139
_state.csv
139
_state.csv
@ -236302,7 +236302,7 @@ CVE-2023-4488,0,0,3f6368d9753580949bdea2af80cfcb860658191c03a10946f9a1d4399080da
|
||||
CVE-2023-4489,0,0,5dcc962b391acc3ca950745865927f0b5b93ff9e3c9d518d52179a09b0ccd62d,2024-11-21T08:35:16.427000
|
||||
CVE-2023-4490,0,0,95278e9eeb741ba71ce165bf2bd71d963c897afa336f7e1107d3b246dec0ac69,2025-04-23T17:16:44.750000
|
||||
CVE-2023-4491,0,0,e7fb463a66c8d27cbf05ed227829af780d33446074985ae7f01a0434a2022114,2024-11-21T08:35:16.687000
|
||||
CVE-2023-44915,1,1,553d43370da112e625bf2847494a8d7f4db5a2dd966d3b4cb102b6ae45e56fe9,2025-06-25T17:15:36.323000
|
||||
CVE-2023-44915,0,1,f7ad8571b1b1e3d2910e03e8cbad3788e28332a505fae99d97ec267bc32cc5c7,2025-06-25T18:15:21.283000
|
||||
CVE-2023-4492,0,0,605dd7244fb3ddc295ed0f891289d5ca2a770154238ac0992591f57a45424aac,2024-11-21T08:35:16.820000
|
||||
CVE-2023-4493,0,0,2796b1478181a9eac538bc721b36ecb80fb9248916674ad472fdb837775724c4,2024-11-21T08:35:16.967000
|
||||
CVE-2023-4494,0,0,8b90870ccf93985a0449b478b3d55d96464c6007cbe02b5109d8599d02441c66,2024-11-21T08:35:17.113000
|
||||
@ -256176,7 +256176,7 @@ CVE-2024-2768,0,0,73606e2fcaa404aa5195b229503329bf796940cee0d4ef224671a9d1016ab4
|
||||
CVE-2024-27680,0,0,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000
|
||||
CVE-2024-27683,0,0,824499003be0e229ade8933c0b741f1dc8e2bc3aa3a921d6f00eb69a58776df0,2025-06-17T20:55:49.377000
|
||||
CVE-2024-27684,0,0,79e38996586f3cc6fd159df489b72d549130b6d544560593ad012e414a54b9f6,2025-05-02T19:32:50.587000
|
||||
CVE-2024-27685,0,1,c3870e025f6a56196e6fcb187a934588355f51c5595d83d62714ed58ba85fa08,2025-06-25T16:15:25.390000
|
||||
CVE-2024-27685,0,0,c3870e025f6a56196e6fcb187a934588355f51c5595d83d62714ed58ba85fa08,2025-06-25T16:15:25.390000
|
||||
CVE-2024-27689,0,0,8a82051a1b625705a6ee303980dd7e966cd157a680599291139b4a2e7a1c6fba,2025-03-28T14:25:42.963000
|
||||
CVE-2024-2769,0,0,f5fed59b7bca296011d1da69594ac44436bea25a4aa43870a75a391217b8bea1,2025-02-21T17:14:54.783000
|
||||
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
|
||||
@ -278335,7 +278335,7 @@ CVE-2024-57488,0,0,a6a8d84b525a0dc3d26ba5e4142d4fd29a34b96ea53e5fe7f7129f2be99bd
|
||||
CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000
|
||||
CVE-2024-57490,0,0,08cbee17964c266f01c15da6cb7fae39dade378b6389b62c9304e6305b5f2be6,2025-04-01T20:23:36.507000
|
||||
CVE-2024-57492,0,0,d7bcfeae2f67d1dbdc17178fdc85652c1f2aae11bdc8f61b17ed6ececfef47dd,2025-03-24T18:58:00.923000
|
||||
CVE-2024-57493,0,0,281144ea2b9ee03e20d71f965d381577551fee08c808915c54780fe5150b973c,2025-04-22T14:15:24.613000
|
||||
CVE-2024-57493,0,1,0b4294a16a71dbaf524ff20f90c33e73e144933a84401f4b5ff9b434d5823c1a,2025-04-22T14:15:24.613000
|
||||
CVE-2024-57498,0,0,45af8f1c6a380d5ebe11a44a6d2a3acd92339d95592a1bfe31934e32a8963e12,2025-06-13T18:09:40.140000
|
||||
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
|
||||
CVE-2024-57509,0,0,c607c9da29bfb31a3cf0e4d4a7622a993cd72daf6b5f7b6cf0694edfad6158b9,2025-01-31T21:15:11.630000
|
||||
@ -278477,7 +278477,7 @@ CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d
|
||||
CVE-2024-57703,0,0,821fb847a6deac1e43851cd3ab1eea58d6954af60eadb9972d53f3a457a3248d,2025-03-17T14:59:32.307000
|
||||
CVE-2024-57704,0,0,a9645cdb100870e11a8ca5752cec5d028eb030155daed4240595658dfba990b2,2025-03-17T15:04:57.907000
|
||||
CVE-2024-57707,0,0,dbc16e213ebc523407e7f3bbaba186d6eb3d9b00db06275beeefc35eaef53a76,2025-03-28T17:24:50.600000
|
||||
CVE-2024-57708,1,1,640afc765e60338d84e80316e4cbe1d06445114b1829e5016e2bd4e859b0a81d,2025-06-25T16:15:25.590000
|
||||
CVE-2024-57708,0,0,640afc765e60338d84e80316e4cbe1d06445114b1829e5016e2bd4e859b0a81d,2025-06-25T16:15:25.590000
|
||||
CVE-2024-5771,0,0,e471b000ba82873f846a0f0e75b0efdd4d37cb6fabf417a41ddc70ef105f4163,2024-11-21T09:48:18.863000
|
||||
CVE-2024-57716,0,0,79da6b902a2967abf048782629438cae155ee0d179ea2083ddc6c325108a1865,2025-02-21T16:15:32.453000
|
||||
CVE-2024-57719,0,0,8a3bc05ba873cf5217ecae9b479d35ef558d2e1821c8bcad96c73a12f31a18c4,2025-04-15T17:13:26.693000
|
||||
@ -284583,7 +284583,7 @@ CVE-2025-20258,0,0,587485bc224e7800bf99678fb698cd6c8d3d28eeeb847ba45799c39e0a8ca
|
||||
CVE-2025-20259,0,0,2b6c28972e4d4c813f43be486ba2790654f4b624edfb74676837346be40ee996,2025-06-05T20:12:23.777000
|
||||
CVE-2025-20260,0,0,9226ca48b92e45380c6214530240c76c3fb395160abf195de5b0390b25ddf3b6,2025-06-23T20:16:59.783000
|
||||
CVE-2025-20261,0,0,cc4f4ebcc501f9646a2caa18052811251321f685cdbad4bbf81f06b9a1734a58,2025-06-05T20:12:23.777000
|
||||
CVE-2025-20264,1,1,82bb289178a1819b730dd0e950e7920186f06e533c32141a8a402c552da2acd8,2025-06-25T16:15:25.833000
|
||||
CVE-2025-20264,0,0,82bb289178a1819b730dd0e950e7920186f06e533c32141a8a402c552da2acd8,2025-06-25T16:15:25.833000
|
||||
CVE-2025-20267,0,0,9f1a8869becd21960978de51d3d70c583f40a6a9b638c69857e8709afa0ac105,2025-05-21T20:24:58.133000
|
||||
CVE-2025-2027,0,0,f4e787944fa975229e7ea27488af4d7a233e07940cd5bde5046deccbe6a0e23d,2025-03-28T18:11:40.180000
|
||||
CVE-2025-20271,0,0,041d554cd9531899ccde50e1767895c0866fbdeefe230e358c4aa41b7baed66d,2025-06-23T20:16:59.783000
|
||||
@ -284593,8 +284593,8 @@ CVE-2025-20276,0,0,3ad655a776b884d16534791fc8b8166700a12ab633ba6b9360b6b8d626f56
|
||||
CVE-2025-20277,0,0,a6caa835cd4bd714d00a035d3a0ba5eb2ff0771a85b71bbf06391308275c3c62,2025-06-05T20:12:23.777000
|
||||
CVE-2025-20278,0,0,ffff167b2cd4793f0110d3a8f165d0e9b2fe4c1c1c871bf75446f31d3d040bcb,2025-06-05T20:12:23.777000
|
||||
CVE-2025-20279,0,0,d5049ae803f9b11db1def0d83c15ac1f8857a6b4477662dfe080d7b3f1c3c618,2025-06-05T20:12:23.777000
|
||||
CVE-2025-20281,1,1,786a77cc7476d6b6af1ab5f77b780b08699081dd23891288df0c9e73f84c939b,2025-06-25T16:15:26.017000
|
||||
CVE-2025-20282,1,1,288b922cfcadf2d4a63f1e0194d37fa7823f298c113073757d2c9e6dd3c96670,2025-06-25T17:15:37.490000
|
||||
CVE-2025-20281,0,0,786a77cc7476d6b6af1ab5f77b780b08699081dd23891288df0c9e73f84c939b,2025-06-25T16:15:26.017000
|
||||
CVE-2025-20282,0,0,288b922cfcadf2d4a63f1e0194d37fa7823f298c113073757d2c9e6dd3c96670,2025-06-25T17:15:37.490000
|
||||
CVE-2025-20286,0,0,23b7719b06d4bbe5498d25b92ee8826f7a22edaa40a9c95c06d7d21180e27a9a,2025-06-05T20:12:23.777000
|
||||
CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c316,2025-03-06T15:15:17.943000
|
||||
CVE-2025-20297,0,0,fd036aef2926b86f71d7b735e8eace20d04567625f017b30a40eab31b1a018ed,2025-06-04T14:54:53.980000
|
||||
@ -288260,7 +288260,7 @@ CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867
|
||||
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
|
||||
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
|
||||
CVE-2025-24813,0,0,c981c31a1c6748cce620d9b8e455047da0daf87f5aa23163f9beb8eaa3df0d7b,2025-04-03T20:59:51.680000
|
||||
CVE-2025-24814,0,1,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000
|
||||
CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000
|
||||
CVE-2025-2482,0,0,13e04c36e9d9620c8f99c8187c0daf7048ec08de8db27a61dd4fede0b1090515,2025-03-22T07:15:25.307000
|
||||
CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000
|
||||
CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000
|
||||
@ -288911,7 +288911,7 @@ CVE-2025-25899,0,0,49509dab92a7490493f015c3a421f3df20422695bc16604a21e744cd92c09
|
||||
CVE-2025-2590,0,0,70d163597c6b54a9b221dbceb999e3dbfd19e4684bda0b9f31a9a118c1978471,2025-04-01T20:23:46.903000
|
||||
CVE-2025-25900,0,0,197edac334969a36528e38515d8f1495b86f020e3a948095f19453a08a5759d8,2025-06-20T17:25:56.670000
|
||||
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
|
||||
CVE-2025-25905,1,1,912d5d44caa86fa12aa8ea1fb79d1e893253ea069130177527d7e0997ba1376c,2025-06-25T16:15:26.173000
|
||||
CVE-2025-25905,0,0,912d5d44caa86fa12aa8ea1fb79d1e893253ea069130177527d7e0997ba1376c,2025-06-25T16:15:26.173000
|
||||
CVE-2025-25907,0,0,681ab7723c80b1301377aa811feba7528ababa2c1485001b8f2409e876bfceb2,2025-05-21T18:13:13.207000
|
||||
CVE-2025-25908,0,0,a81766b666c2964fee0c02555ee0c938dc13151d974c9b24e038826f4a0a2e05,2025-06-23T20:13:31.600000
|
||||
CVE-2025-2591,0,0,ee87141e12ee943e529b8bb384fb8bdb2408b45f9dddbdaf93fe6f79882786ad,2025-03-21T14:15:16.853000
|
||||
@ -288951,9 +288951,9 @@ CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b79
|
||||
CVE-2025-25975,0,0,c7ae5024d7c1da6f92e210675a350a113c52c6740e0703a23a707910f48a357b,2025-04-02T20:34:36.553000
|
||||
CVE-2025-25977,0,0,4702968f0c1b258952258a9aa143e03d32db9d11b787479cd28f012b8795d2ac,2025-03-25T16:53:13.960000
|
||||
CVE-2025-2598,0,0,b50cbb174f8d7ed196c7f8d3676b5ce8db1caf23ae4aa36ac51430d384cef471,2025-03-21T17:15:40.090000
|
||||
CVE-2025-25983,0,0,00f17cce31ebed698374519801a641eb87d8b79180416bc3f3d70a5ba7c5377d,2025-04-21T14:23:45.950000
|
||||
CVE-2025-25984,0,0,d740e34dea84ee9fa3ce45e1fe5e3931b6167843cb4644b81988d8bff58d6674,2025-04-21T14:23:45.950000
|
||||
CVE-2025-25985,0,0,5811e2bd345d82cdb4e6c24993fd734173543d42944853c57d0525eb27b95d5e,2025-04-21T14:23:45.950000
|
||||
CVE-2025-25983,0,1,6316a73d4a7f08948668712780e827e513a297b6dbd597621539172966a81d0b,2025-04-21T14:23:45.950000
|
||||
CVE-2025-25984,0,1,f0796b73ad5b18901b06def58763adf4a475f45a3ab58a694105b7097bd4954f,2025-04-21T14:23:45.950000
|
||||
CVE-2025-25985,0,1,3430c3a686a3a95cbe70fa6d5d540f2701000565a86078ed49e67cf2d6a2a774,2025-04-21T14:23:45.950000
|
||||
CVE-2025-25988,0,0,5c8cc40e52f5abeda2066ad42d9b1c19b1561a7836a143661160fa4695bd5239,2025-04-18T01:53:55.127000
|
||||
CVE-2025-25990,0,0,3d3421488538e389de82f65b8779919263ea06659210bca53f7c01e57d7c8d1b,2025-04-18T01:50:40.287000
|
||||
CVE-2025-25991,0,0,b6b2c5f565fd47d7c4d0fc9ccb2a8ae9330c94035267df3257b2f3af23f53a17,2025-04-18T01:48:51.487000
|
||||
@ -295607,7 +295607,7 @@ CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4
|
||||
CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000
|
||||
CVE-2025-4420,0,0,482e6cb0127b5cd1381f571129f0abb13f48f8e0b486724260c2eec90487cec8,2025-06-04T14:54:33.783000
|
||||
CVE-2025-44203,0,0,0fc211e03bfd6217fbe70fff9e8cc6d2fe1b40df7eceee0396b3d097bc738852,2025-06-24T16:15:27.507000
|
||||
CVE-2025-44206,1,1,bcf8c43764d9f23abe08370a8241183b1c8b3a14693e972a7012ad0743e79f9c,2025-06-25T17:15:37.740000
|
||||
CVE-2025-44206,0,0,bcf8c43764d9f23abe08370a8241183b1c8b3a14693e972a7012ad0743e79f9c,2025-06-25T17:15:37.740000
|
||||
CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000
|
||||
CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000
|
||||
CVE-2025-4429,0,0,223e012c1a27f7a458a5e6c8ec2a74e0aaf4b880fb51252379cf02d8237e0f40,2025-06-09T20:30:46.543000
|
||||
@ -295792,6 +295792,7 @@ CVE-2025-45321,0,0,9227564f6386651a6df0923ea8fb2c1e9f2a2f4487dcf05f9020b166648d7
|
||||
CVE-2025-45322,0,0,bd98baac9032c4924e89f536321099d3c4e9b0a26b0e91693b82dcae0f7fc3be,2025-05-07T16:40:08.760000
|
||||
CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000
|
||||
CVE-2025-45331,0,0,1a763087f3a9266aa4ad598d9cc797aba7ebe6d738e262c7bb0a83be881654a7,2025-06-24T16:15:28.007000
|
||||
CVE-2025-45332,1,1,dad5ffe999fc406a7d4a0195ad5397b0fdf97a2b911d2dd9b5e5157c4c9992c1,2025-06-25T19:15:23.110000
|
||||
CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000
|
||||
CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000
|
||||
CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000
|
||||
@ -296211,7 +296212,7 @@ CVE-2025-46554,0,0,a7b89eea12b63e666a925ea1c3ab241ef8ea8e981646e1e96bcb6f05587df
|
||||
CVE-2025-46557,0,0,695475fbfc401718c197f3766204de189f65619ff7e66fe731891859004c2d14,2025-05-02T13:53:40.163000
|
||||
CVE-2025-46558,0,0,46044112001a42c9e94971cbcc8641b730ce8831adfe756198a0c859c9d96131,2025-05-02T13:53:40.163000
|
||||
CVE-2025-46559,0,0,6f9c7ce4b09e8d2873d9fa1c8ec5bc239aba3f166b5bb4136391a9939ada4ec7,2025-05-05T20:54:19.760000
|
||||
CVE-2025-4656,1,1,a8806aede8346b7e2fd2d5e5607a21ec471bbcd89b61bf060c386a101551c41b,2025-06-25T17:15:38.440000
|
||||
CVE-2025-4656,0,0,a8806aede8346b7e2fd2d5e5607a21ec471bbcd89b61bf060c386a101551c41b,2025-06-25T17:15:38.440000
|
||||
CVE-2025-46560,0,0,6a0b92fa9b29effaffc6e89d51a92fd2337a6f1c3f6c1149eb2801e9c0d0f8d6,2025-05-28T19:15:56.887000
|
||||
CVE-2025-46565,0,0,c6310b0d16caffb5c4fca228b199569c838bec718e60758c1fab4e44d373407a,2025-05-02T18:15:27.060000
|
||||
CVE-2025-46566,0,0,24d113192be0c68059a74a8b38378d8007a4303882cf168243cb6e7bc5606a7f,2025-05-28T16:02:36.163000
|
||||
@ -297600,7 +297601,7 @@ CVE-2025-48951,0,0,ede6a9271ef2c495a550496dbd581ce6ffb53f4b9f98c935ca8083cc1b4fd
|
||||
CVE-2025-48953,0,0,70684a4684db41347c8126e913d4ccc37a9d8250a7889d7b10445edb04853791,2025-06-04T14:54:33.783000
|
||||
CVE-2025-48954,0,0,be94716afcd7eec26cedcf292580287f8fec6815147609b02d7ecb570a044924,2025-06-25T14:15:24.777000
|
||||
CVE-2025-48955,0,0,560b04619e43ec6eda07e48b947f9bc229ed274e024fa427eb478249da962f8f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48957,0,1,2a3761a5801fd5ee703634fc43f87a21218d925d9f5bdb2e21bd6c0c9aad55ce,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48957,0,0,2a3761a5801fd5ee703634fc43f87a21218d925d9f5bdb2e21bd6c0c9aad55ce,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48958,0,0,8c90d5f5b1a3b380eb0fd9a0eabccd26db118226ac52ddc9c94ec9a7d02c9ea7,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48959,0,0,55ce7b99f1833d3a24c336c621480457f088960383573f163be8ebb2ce71d800,2025-06-04T14:54:33.783000
|
||||
CVE-2025-4896,0,0,eb43857d84c4e3c0ca9bf4ac15086d7606c87aaeb17237d45e10278d3431115c,2025-05-27T16:30:13.490000
|
||||
@ -297691,9 +297692,9 @@ CVE-2025-49148,0,0,c3b7fb08d13ff41d0698bee1d7c392e956316a8e5553d1877a2eed546fcf4
|
||||
CVE-2025-49149,0,0,798bf70c7539e563311e2175a9634dcea6df9b43d0cf6e2ed916f772705b4b0f,2025-06-18T13:46:52.973000
|
||||
CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000
|
||||
CVE-2025-49150,0,0,83cc8b08fd5b5a9872066bcee75026b50521e5c31e643b9fa688d6c170487f61,2025-06-12T16:06:20.180000
|
||||
CVE-2025-49151,1,1,ed678f667d2790aae167b274051e49b7b9f0b4d32fddafd8e4bb038ce01df9f3,2025-06-25T17:15:37.897000
|
||||
CVE-2025-49152,1,1,1eab955497e2468c87d03a757a6a4b7d7cc23da384b98f86486c1e46f0438fda,2025-06-25T17:15:38.100000
|
||||
CVE-2025-49153,1,1,20f902a50a6280926a075496e3dd1f94f40eed84a0d77c1c70adc91241687eab,2025-06-25T17:15:38.263000
|
||||
CVE-2025-49151,0,0,ed678f667d2790aae167b274051e49b7b9f0b4d32fddafd8e4bb038ce01df9f3,2025-06-25T17:15:37.897000
|
||||
CVE-2025-49152,0,0,1eab955497e2468c87d03a757a6a4b7d7cc23da384b98f86486c1e46f0438fda,2025-06-25T17:15:38.100000
|
||||
CVE-2025-49153,0,0,20f902a50a6280926a075496e3dd1f94f40eed84a0d77c1c70adc91241687eab,2025-06-25T17:15:38.263000
|
||||
CVE-2025-49154,0,0,86ff37b581264b7df1b0bb3a86adcf993ea8d18f7e79c73b909f888d9f9790e5,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49155,0,0,4d0f00f02d2c0de9913540e76adc4815296ddadc8fb056613c64baf14f729730,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49156,0,0,ee61c7bc3d4439a31549df380a7527546fb87d317109fcfc4d58ebcdcdcbdd0d,2025-06-17T20:50:23.507000
|
||||
@ -297903,7 +297904,9 @@ CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab58
|
||||
CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0dc64,2025-06-12T16:06:39.330000
|
||||
CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000
|
||||
CVE-2025-4954,0,0,1ec01516c4567931b4ffc24e86d8b1eee9006bb52ce75acce1cd554027fb1f48,2025-06-12T16:06:39.330000
|
||||
CVE-2025-49549,1,1,3cdea74f2b27328d61ede02d1b883fc758dc512c5716b1bebb308782c81aa33f,2025-06-25T18:15:22.163000
|
||||
CVE-2025-4955,0,0,85a93e6cc9d76b6eb96cac66d66bf9a676c7375a6a733a4a5f80ea99e88eb438,2025-06-18T19:15:22.137000
|
||||
CVE-2025-49550,1,1,5a1a8d45833df3de3b7a8b671a92645e7d71893b7c7807340515dc53dd41f3f4,2025-06-25T18:15:22.323000
|
||||
CVE-2025-49574,0,0,fb5e38666a9d5db5e2fea3eff17a1cec1849b841049d294374c0873eea7d745e,2025-06-23T20:16:21.633000
|
||||
CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49576,0,0,d91dc4671dcd271f2349061a8890351137f780e1115b96e716a0a31c8aba01ac,2025-06-16T12:32:18.840000
|
||||
@ -297977,7 +297980,7 @@ CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31
|
||||
CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000
|
||||
CVE-2025-49842,0,0,25f68be05f1cee4c74ac248773f32070b2173a4b15896e09f4b989979b7acc44,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49843,0,0,3ce87e24261a9fdff34add493306129aedca185abd872f64a461b73d97b21a66,2025-06-18T13:46:52.973000
|
||||
CVE-2025-49845,1,1,f6724224f59f64215f43253ed55677e223b8082b09a909a1475714785dbf754f,2025-06-25T16:15:26.533000
|
||||
CVE-2025-49845,0,0,f6724224f59f64215f43253ed55677e223b8082b09a909a1475714785dbf754f,2025-06-25T16:15:26.533000
|
||||
CVE-2025-49847,0,0,7d21c5c1860aa76487ad1bc7479f34d7fb9518eceaeea5666e76274273725a59,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49848,0,0,b95bb6de409da27e91c496fa7bcb82f15f67ace27f6d4466f1b54c31461703df,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49849,0,0,8297db97c7fc15aa30d3cd9f82603f74eb8025767596630d8a5943b91e5623f1,2025-06-17T20:50:23.507000
|
||||
@ -298112,11 +298115,11 @@ CVE-2025-50146,0,0,a29eb81652fbdbff4eb9784ecc310851d8a5f254fdaa43a44307e4565d66b
|
||||
CVE-2025-50147,0,0,06f423da68cad4a160f97a2e15cdb4717d8e0749fbf30e02ba8f93817ebea777,2025-06-14T03:15:22.033000
|
||||
CVE-2025-50148,0,0,a579a7a614133c548ddf669439de5c9a80232a494034f718b4bdf4decd1a049f,2025-06-14T03:15:22.097000
|
||||
CVE-2025-50149,0,0,e01be1ba294ecdeaf476ba9bb17e64b1284ce9362fb5da1703e5c224f2a8901e,2025-06-14T03:15:22.157000
|
||||
CVE-2025-5015,1,1,80eced45c29e4192bd6fddea197a34fe71b744a1a97d6f6c9b516281e557684d,2025-06-25T17:15:39.970000
|
||||
CVE-2025-5015,0,0,80eced45c29e4192bd6fddea197a34fe71b744a1a97d6f6c9b516281e557684d,2025-06-25T17:15:39.970000
|
||||
CVE-2025-50150,0,0,79eb21a64f645c369296b1d0b905e35268f567b5a96dfbfc58ef963e4e69507b,2025-06-14T03:15:22.220000
|
||||
CVE-2025-5016,0,0,d907c2ff3d5c65fe44aee01e8b0e3594629d2dcb543e14c1a3c5bbcba44c8083,2025-06-02T17:32:17.397000
|
||||
CVE-2025-50178,1,1,c9f5439aa4895214439fcda293716b2de6eed159d807680fecc8ff6a13fdd238,2025-06-25T16:15:26.693000
|
||||
CVE-2025-50179,1,1,c37ed09aff9bcca1733ad563e45f75915e017d9f8430b020a2cfcb9ec5cae40a,2025-06-25T16:15:26.843000
|
||||
CVE-2025-50178,0,0,c9f5439aa4895214439fcda293716b2de6eed159d807680fecc8ff6a13fdd238,2025-06-25T16:15:26.693000
|
||||
CVE-2025-50179,0,0,c37ed09aff9bcca1733ad563e45f75915e017d9f8430b020a2cfcb9ec5cae40a,2025-06-25T16:15:26.843000
|
||||
CVE-2025-5018,0,0,e6074d13c744f0bbc4fedce0adf645747389e40f5acdd13f0492e74df313cc90,2025-06-06T14:07:28.330000
|
||||
CVE-2025-50181,0,0,4bdf1b0e87651e9af62532f1dffa4a7c36e3e1617fb3111bf59ec0dfb2494567,2025-06-23T20:16:59.783000
|
||||
CVE-2025-50182,0,0,4dd8afd99e0ce6ea440c7ee9404999630bb6f82b61b026f37ab73c00c8dcbaaf,2025-06-23T20:16:59.783000
|
||||
@ -298322,10 +298325,10 @@ CVE-2025-52467,0,0,16105c9074c96ad94abfdf299814ac8afdc45b40f5844eda614417a0d3d4c
|
||||
CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000
|
||||
CVE-2025-52471,0,0,0c62d382ed0af363c08f042f130801cb12a4f00ca1898ecf3fe6d67ae2476ac6,2025-06-24T20:15:26.033000
|
||||
CVE-2025-52474,0,0,85659b730b44219986935e49453dd6cf44bae5c711fd564545190739032f0da6,2025-06-23T20:16:59.783000
|
||||
CVE-2025-52479,1,1,c2fb883dab9af3bda17257faea1540c97a64f864f363f43f9aac347719c31a58,2025-06-25T16:15:27.017000
|
||||
CVE-2025-52479,0,0,c2fb883dab9af3bda17257faea1540c97a64f864f363f43f9aac347719c31a58,2025-06-25T16:15:27.017000
|
||||
CVE-2025-5248,0,0,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000
|
||||
CVE-2025-52480,1,1,9058ad9c4f4d9cf4adc8bc18d88405dbdd03cfd1af621ce6c0bb86ccfe2ced26,2025-06-25T17:15:38.590000
|
||||
CVE-2025-52483,1,1,80af078f5b6a5390f5f8f1f84dc60a205799f090fc6088f33fda46e21788b176,2025-06-25T17:15:38.740000
|
||||
CVE-2025-52480,0,0,9058ad9c4f4d9cf4adc8bc18d88405dbdd03cfd1af621ce6c0bb86ccfe2ced26,2025-06-25T17:15:38.590000
|
||||
CVE-2025-52483,0,0,80af078f5b6a5390f5f8f1f84dc60a205799f090fc6088f33fda46e21788b176,2025-06-25T17:15:38.740000
|
||||
CVE-2025-52484,0,0,ec9ef999d2f72c8ffe8c4f7a55a34b60e694dfe44a26c58275639cad0c1b5155,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52485,0,0,34b5109dabaf6ee325fa57f392ef3cb86ca76746a55539af15d1209f1b4df50b,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52486,0,0,141d3cdd89e3d8b09e19fb7d7dfc50e25ac40afc5c2dd413dd0730327594fdb3,2025-06-23T20:16:21.633000
|
||||
@ -298347,13 +298350,13 @@ CVE-2025-52561,0,0,de14de6e04dddaa9a1477840b59ee04f631f59ec755018a4483ce3081c807
|
||||
CVE-2025-52562,0,0,71dd25f3bc7ea4bcad36c0d751ccde968119f77e0cfe3d00439d8fcb91d44c5a,2025-06-23T21:15:26.710000
|
||||
CVE-2025-52566,0,0,5efb8ea62bd38ad614e3c01ce5a8ad7c0d7fc97c6a0fc9a74aa3191d55ca9d8b,2025-06-24T22:15:22.490000
|
||||
CVE-2025-52568,0,0,c5c4449512757bdbf87c08ff7aa03ea210585f8118654ad489df4eddb6c078e6,2025-06-24T04:15:49.693000
|
||||
CVE-2025-52569,1,1,deab68b0b8976f30252b10598a00e0bbf9baa4bebb8d7c05eef54f36d198c69d,2025-06-25T17:15:38.883000
|
||||
CVE-2025-52569,0,0,deab68b0b8976f30252b10598a00e0bbf9baa4bebb8d7c05eef54f36d198c69d,2025-06-25T17:15:38.883000
|
||||
CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000
|
||||
CVE-2025-52570,0,0,b69e7827dc71b47cbfc70d06c560ede1e01f1eed518d271e063fa0ddf9df6ff5,2025-06-24T04:15:50.360000
|
||||
CVE-2025-52571,0,0,93605af77865e4b4bbd8aa8df37b6227ed19cbe7c36e4563dfbf22f7ad6141df,2025-06-24T20:15:26.213000
|
||||
CVE-2025-52572,0,0,c9098d5ca2a634c2c4a58c403cfc6222ba614b823936e2401333651171589a19,2025-06-24T21:15:25.463000
|
||||
CVE-2025-52574,0,0,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000
|
||||
CVE-2025-52576,1,1,b4c56c7b9a729c8f280db8fa5dd30239ebf3bcd2312021dbd0263b2583a65720,2025-06-25T17:15:39.023000
|
||||
CVE-2025-52576,0,1,54ca2c256007cfab31d182d53578f909d2f84aab8167fde4bfa01ad557b852cc,2025-06-25T18:15:22.537000
|
||||
CVE-2025-5258,0,0,fb6007864f0f198afc07f9e5f2cd9992c3bc7deee34ac7dac8830ce62da80bc3,2025-06-24T08:15:24.397000
|
||||
CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000
|
||||
CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000
|
||||
@ -298404,22 +298407,22 @@ CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3
|
||||
CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000
|
||||
CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000
|
||||
CVE-2025-52875,0,0,70ff6c04abc6cfce849406946b406a459cb9d17561e94e81ec5aa5fb6103e540,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52876,0,0,04a8f13c1a5d28a7ba2f4420d94289fb86c66499f08f149bf03ece2dbbc8cea7,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52877,0,0,c1d6e2b07ce02bba590986d3df9c7581e2aa81b981d3f15dad43eb041681dd92,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52878,0,0,e55775b8d24e3fed0ad2e0acdd563793038173ab54bc92391fdb84ab91ed384a,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52879,0,0,36a19ea63eabffb0ae9b5df676b3f85180b31571a550ff8a02ef30a65c0880dd,2025-06-24T15:15:25.180000
|
||||
CVE-2025-52875,0,1,e9df91153b54d2d59391efb611b52e304beca301fa5862d67a6ec1b3285aeed5,2025-06-25T19:30:15.433000
|
||||
CVE-2025-52876,0,1,32e8cc2407911ee2561e8ed5111f7d793b71fd7e6e2d82dac958dca702d728ba,2025-06-25T19:30:24.007000
|
||||
CVE-2025-52877,0,1,2ac53278d65eb7e21c25b07c01cbc1d7b2de22e8edc09c69cfec8cd39a1e37af,2025-06-25T19:30:30.747000
|
||||
CVE-2025-52878,0,1,fbfff86b93cfc3e760e930078ef07b0c286c0d1ac11c1a2c0806a69f8f7a68fe,2025-06-25T19:28:34.493000
|
||||
CVE-2025-52879,0,1,fc5c35c3abe12a17a6329028b37aa300e4688c00b5339defe42f41204f2a72ae,2025-06-25T19:28:19.253000
|
||||
CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000
|
||||
CVE-2025-52880,0,0,9cb07f316e3d88e0df580ddbed7ea9b43e79f625bd4ca243674ed28fb6c24809,2025-06-24T20:15:26.373000
|
||||
CVE-2025-52882,0,0,1202797e512191e9de7b995f3a96465f7bfc2ed3174a803e0c7dd48572c30229,2025-06-24T20:15:26.543000
|
||||
CVE-2025-52883,0,0,94a59b16d2725ff940e9d9c5d66af8696ae28208bd1cc6d6422de88432398bcc,2025-06-24T21:15:26.030000
|
||||
CVE-2025-52884,0,0,111efc59963d9cf24b8cfd776de05a966fe0af3c7a58d02e676305ff800577c2,2025-06-24T21:15:26.207000
|
||||
CVE-2025-52888,0,0,3d1af33939cf7d42fdad330956d26c92022bdd0439ccab86c4344f860a5a72bc,2025-06-24T20:15:26.700000
|
||||
CVE-2025-52889,1,1,d903d8acd2782d88708ca4d03d5476dd04d5e30d0eb3f5435140f8fa2f45b70b,2025-06-25T17:15:39.200000
|
||||
CVE-2025-52889,0,1,9da61724b301758b81e861d135c2b4f87c1d9193c45f2d7ba9df9323c5b8a14a,2025-06-25T18:15:22.653000
|
||||
CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52890,1,1,a4d0b3726363b790f1a7c7628d4db4c2f8d4afa33e36325afdee22f6844fbab8,2025-06-25T17:15:39.370000
|
||||
CVE-2025-52893,1,1,fde8c69e5dfb177b45c8843696effb13dc55e52e52a7f13d69ef2cf3a5264867,2025-06-25T17:15:39.523000
|
||||
CVE-2025-52894,1,1,86c1ea7749bd2ac6272c7b237f4f0745b29d5d1222611ddfdb5e5bdeb4764540,2025-06-25T17:15:39.677000
|
||||
CVE-2025-52890,0,1,21f05b9dc7685c75ed3a78bf53cc0622eed7e0158a3757e7d2757bba0471ef1b,2025-06-25T18:15:22.753000
|
||||
CVE-2025-52893,0,0,fde8c69e5dfb177b45c8843696effb13dc55e52e52a7f13d69ef2cf3a5264867,2025-06-25T17:15:39.523000
|
||||
CVE-2025-52894,0,0,86c1ea7749bd2ac6272c7b237f4f0745b29d5d1222611ddfdb5e5bdeb4764540,2025-06-25T17:15:39.677000
|
||||
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5291,0,0,30fc605f4380fb7e9cd3dc4c3c29792847dcfc90b0ea5fa3ca9a29d145a853dc,2025-06-17T20:50:23.507000
|
||||
CVE-2025-52916,0,0,aaaed48e0f18bf7221f6e78c081756a27d5cc78db64cc6bd43ff354b6dcf72ac,2025-06-23T20:16:21.633000
|
||||
@ -298453,7 +298456,7 @@ CVE-2025-52978,0,0,536489d1a428144098c443cda432c2d1561802f8cd5aef013e6017d271275
|
||||
CVE-2025-52979,0,0,52505f03c11370107b014986dc0342ab4c8462260c5f831736e7ef7e18fd3712,2025-06-24T03:15:35.453000
|
||||
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
|
||||
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
|
||||
CVE-2025-52999,1,1,8a6973aa5c242bcc72c2aa1d3ea8125d3c697581af3172eff6b5e1b688b524fb,2025-06-25T17:15:39.820000
|
||||
CVE-2025-52999,0,0,8a6973aa5c242bcc72c2aa1d3ea8125d3c697581af3172eff6b5e1b688b524fb,2025-06-25T17:15:39.820000
|
||||
CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000
|
||||
CVE-2025-53021,0,0,f00c7a7e87b168adf26db9622068d05e126e48777cea689658514ba01dbc3fdf,2025-06-24T20:15:26.867000
|
||||
CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000
|
||||
@ -298836,6 +298839,18 @@ CVE-2025-5806,0,0,eced74af9a3bd847a96fe591b592713a189dcd85d66bd43936ab31bd4aa88a
|
||||
CVE-2025-5814,0,0,a167867f53c6fadb9d3db3d4ef4e109f1fea46d1abeb35216542db72110fa696,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5815,0,0,3c63e526b28352a674f2d0faaef2707920143cb75a4277d3e7f975593f6cf816,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5820,0,0,b9ca733f7fe3ed3e4755dc87c7962fd7e35b781d4f99707bb6e28495b55dd7d0,2025-06-23T20:16:21.633000
|
||||
CVE-2025-5822,1,1,a6e7691296db4206dce11d1d4373b526ee4137b730374a19419918c782849c2c,2025-06-25T18:15:22.900000
|
||||
CVE-2025-5823,1,1,25e51772ebfdedd9d5a4f2ae432423c7f2a3ee8faf0b512b277ea30c5e95e1b9,2025-06-25T18:15:23.043000
|
||||
CVE-2025-5824,1,1,d8f3987803ef074c18e732214b107c4634e2d28fc6412edbe8717cced2eef527,2025-06-25T18:15:23.173000
|
||||
CVE-2025-5825,1,1,cf89d825870f74aa7d542fb1e6c0bebd2a2a3155e1f63942a81ec55d25c1bd20,2025-06-25T18:15:23.303000
|
||||
CVE-2025-5826,1,1,83011e311b27ca4037b6bb38b32845feda7ccb398696aba7ba6dd4155f13d9c4,2025-06-25T18:15:23.433000
|
||||
CVE-2025-5827,1,1,584c2c9424411bded0549a4fa5777aba8ec227dbb316d1e7e0413298517fd6b2,2025-06-25T18:15:23.563000
|
||||
CVE-2025-5828,1,1,a00cd62db7d130cd815be25d450edea1722a06b13c35aa7250da18fa370bfdea,2025-06-25T18:15:23.683000
|
||||
CVE-2025-5829,1,1,34080de17461dae45b28f4f733d23ae3d5f12ad8f21bf2d608e3aa9191d624b7,2025-06-25T18:15:23.817000
|
||||
CVE-2025-5830,1,1,4628d406d603f6e1bf64b337b66f02ec3b5c03b1c213261e58222fd28cadf757,2025-06-25T18:15:23.950000
|
||||
CVE-2025-5832,1,1,07137da5eb6c1a7b02599d6b1d6fe8fd53e5c00e671b44cad00bf5012b7fd5e3,2025-06-25T18:15:24.077000
|
||||
CVE-2025-5833,1,1,a784ae45b2249dc4cb6d62ca1209fa997ae22d259fd7d11f09f16d9315e32d70,2025-06-25T18:15:24.203000
|
||||
CVE-2025-5834,1,1,12171deb212b62a3a6d092072f9b465d7cb7bdefa72ab660f5350558fb550acc,2025-06-25T18:15:24.337000
|
||||
CVE-2025-5836,0,0,d80bb6457241c6112de58f50d5f8d524854cb0ce4d9b0e26a6df5eac567f78ac,2025-06-09T19:07:49.417000
|
||||
CVE-2025-5837,0,0,85c1936a3a1142d6d72d779afcb63f2a00a18b124b5cff42b89badcdc2313d9c,2025-06-09T19:07:41.590000
|
||||
CVE-2025-5838,0,0,35626c7c8e1d04fa7bdba348c0108b2c123b4d5d313bbcf8d5dd0d6177716b08,2025-06-10T14:56:21.530000
|
||||
@ -299075,7 +299090,7 @@ CVE-2025-6201,0,0,09953b11a7588a9edc2f3925b0cbb84add185ea803d7765dc4a2a786cd413a
|
||||
CVE-2025-6206,0,0,f095e462b0f9c530be73de1fe9b71847681b1cb490797f58b1dc23dd20a548bf,2025-06-24T09:15:25.653000
|
||||
CVE-2025-6216,0,0,fa2fdcc5033cf3a1df6342a01f2acd273f87b99c1664b4ca0db573d99035212e,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6217,0,0,0d2c65c94d7cc4fabd9027df56e983345e1f33543f29c53f0c45cf319713d14d,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6218,0,0,60b93bf2429df4a16c19e53a62f3b21ec7d5bb0d9d051ec79f965362e4984c0c,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6218,0,1,0c57dc44b918f69aa41dfa2cd45995e68693308920cd967c81e00d12734bb127,2025-06-25T19:03:33.817000
|
||||
CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000
|
||||
CVE-2025-6240,0,0,ba4da5fd605eca3c919532cf0a8a1661ebda5a87c35d4010c4dddeaa23d93e9a,2025-06-23T20:16:59.783000
|
||||
CVE-2025-6257,0,0,cc91b7557b526c88672e08add1b684bde89a65ab4dd7fa052a99a1c1c9c823b5,2025-06-23T20:16:40.143000
|
||||
@ -299202,8 +299217,8 @@ CVE-2025-6417,0,0,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f
|
||||
CVE-2025-6418,0,0,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000
|
||||
CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287cf,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6422,0,0,106ef9916b04166cc5945f1203191244e9fd131bda586696c6c5fbd69a1a1382,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6421,0,1,3169c91105fc051d7d3498fdef6562a4792481aab354e9c38ba63bbee575aace,2025-06-25T19:50:23.227000
|
||||
CVE-2025-6422,0,1,b5bb87a55ad52736bcc24be8713e2086821b4454f2e12e2c901389f24f632355,2025-06-25T19:49:55.057000
|
||||
CVE-2025-6424,0,0,704a069dc96dca71fe354883645bea382ab0c9fd3bb7414fe9bdeeaec02801fa,2025-06-25T13:15:26.633000
|
||||
CVE-2025-6425,0,0,37554c1bb11125532c063480723f0967d059383384551013981c911f7964aa9b,2025-06-25T15:15:25.200000
|
||||
CVE-2025-6426,0,0,9631dea9d79fb8b8a8783d7c8f5964e231b5b4d02fe77d7c6cc807b1da948fcd,2025-06-25T15:15:25.350000
|
||||
@ -299217,7 +299232,9 @@ CVE-2025-6433,0,0,388a9e3c4ce770334337fb5b365eb81eea0a09dd37d26b543d992df75886ba
|
||||
CVE-2025-6434,0,0,25d2270e780cca263d82591b90f92aabefeed0e60517c8b2fc08da412d22a7a5,2025-06-25T15:15:26.313000
|
||||
CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
|
||||
CVE-2025-6436,0,0,b655c6d628ece84d2581d41deda59948052e0591127f35cfcba6d4941af2d6a1,2025-06-25T14:15:25.260000
|
||||
CVE-2025-6442,1,1,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000
|
||||
CVE-2025-6442,0,0,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000
|
||||
CVE-2025-6444,1,1,001723fa0e5477753e66a94b40ca3050bd1b3c324935cd810fadea01384c5f5a,2025-06-25T18:15:24.463000
|
||||
CVE-2025-6445,1,1,c4d022822323925bc49f742249f5576d460d2c00c9d8f44065d3325e11103521,2025-06-25T18:15:24.610000
|
||||
CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6447,0,0,ccb7491a53a65edb2a46fa34f91bfc98d3e4b5a673ea57cbc2e7809ed2b6f681,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6448,0,0,8222bc4acb92d0f776e1d0bca83e07196c49a6462816bce44b6bf839e1dbed85,2025-06-23T20:16:21.633000
|
||||
@ -299237,22 +299254,22 @@ CVE-2025-6469,0,0,83a2d2f2e5e6485157d5b7bdaa0d82e61ec7d695fed15d7d94efe7de355d17
|
||||
CVE-2025-6470,0,0,3072ae13c663df61e4a9e0a80f8ab3a7a714c313d9a510bbfea6641ebef68093,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6471,0,0,d28e88e216194e1d4a69d1c07a616ba3d9f104a98822b5c0784ad67535c62147,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6472,0,0,7be29641df306cfeb39a003c7df9102622cd0a8c07cfda5fdebf78e39d4ecb52,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6473,0,0,6a7e0d0ab219ae1c36d317fc25e54910cf5c34f76a22d629d5f49a03c3b4557d,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6473,0,1,f821ace141e7154584a5b72f1adebfe8462fb064a2672193822b96783f6d8a75,2025-06-25T19:27:31.730000
|
||||
CVE-2025-6474,0,0,ab188f09f0a4e137326cbf1eb98ac56db23d545a6aeac89464fb4cc91222e613,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6475,0,0,dca16a683d20010a85900288f75a3de83ba9a3b4422e79f680677aec00cdaec7,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6476,0,0,0bde69972fd7d4d715236588866dbd079ae31b0d16a0101bbc35bab247de9426,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6477,0,0,8f25e99d5fc009ebbbf7a6b464239d973a3c04c051b2de363d01488afd50cbf5,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6477,0,1,718d8ccaacc87e1c57765c6643de1f27af3dbe6e78ffbb21600c33723313882d,2025-06-25T19:25:44.190000
|
||||
CVE-2025-6478,0,0,d774f1cad8b6a052d9c9d66872d7e1882d2cd9753c27522c8e48c07fe14fb0d7,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6479,0,0,707c51c89125fba74075a99555d176c24530c02597d5a36b9a33428613d00fff,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6480,0,0,e665af43fc4945e08e4681f377152c8cddf29ddef68042a9491c89d4cd73955d,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6481,0,0,4a422750712d846ea4bc617572c2ade3b740bd4c45a35327e5f1d555a9e74521,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6482,0,0,0d6777e536ddf35c412e6a461bed653f392eaf8e0fa7d55fde9356ab768d3833,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6483,0,0,a92c6a3375c4369d8ce307ca7e6dd36a84f411cd9c53f319bcd6ab4fb594067e,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6479,0,1,2c5b2471154f56ce282446555e3678e22ea4cd2374f79e129a80d30240de1c44,2025-06-25T19:19:01.967000
|
||||
CVE-2025-6480,0,1,93237f12d754008f7fd67ea5d034bb783649924c98eaa92f468d9844c78fedc5,2025-06-25T19:18:18.497000
|
||||
CVE-2025-6481,0,1,1cd9ac72b2551a82a6ec3b44ea1539e5705eb042de1232a95404e2239e6bab0b,2025-06-25T19:17:25.407000
|
||||
CVE-2025-6482,0,1,5d9b1000b5d1a1e04ebe40fc9260c0232dbad78f44f50c5f5cec64e6a0c3e19b,2025-06-25T19:05:40.337000
|
||||
CVE-2025-6483,0,1,4313a3c69035e6a16330d54d49f5ee7b43e01f4f617cf5c1fb4d9d3d843d5404,2025-06-25T19:01:58.797000
|
||||
CVE-2025-6484,0,0,a6d61d15a4e77f3663222170cf96ffb28eeb3ee03303971384acc6bb6b1e7cd6,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6485,0,0,c3bfaf3156b24b48ed7df161013a46e71c3a7c8d284b7c2c35496e59348d5c4e,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6486,0,0,e24a3f94304d6ec8a62fde73f6e0e74527bc994c56d09db0c7cf700cf6e938ab,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6487,0,0,e108ed1dcf35bbb825eddd4623b13fca6328df0f219ade81882ad971066fe2de,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6489,0,0,ccba4580028e587a12bab89f49b969ecebe28a4e597d9a436f5f1ee931b82aa6,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6485,0,1,fbaabbcf16b6f45dad70787ff83c2f2a40a9d66713f014579d4bf4c3d0b9ecf7,2025-06-25T19:31:46.050000
|
||||
CVE-2025-6486,0,1,9279349c7782d4462e26da818de9d0c7bcf2cfb484b863830cae3c45969d1782,2025-06-25T19:31:37.533000
|
||||
CVE-2025-6487,0,1,29e0a7237d62fc67ee05c71aab1c7439f3b9715b366fd94f580ddf8afdfdbd57,2025-06-25T19:31:27.433000
|
||||
CVE-2025-6489,0,1,76ec524cc88748434edd32da385ea8c072cc94c0dd99ce64a004c4e1e23c404b,2025-06-25T19:31:16.637000
|
||||
CVE-2025-6490,0,0,712875650a18bc82ee42534b81765312cd07e271d860b7988f6e06a27f515abe,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6492,0,0,f4c450e5238d0b6066bddd75aa5d427fff899ce0a5a143de6c2c6c6e80c1f5f1,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6493,0,0,f54e9deddeec98b5a4250c90a84de909e0f3c6a0b361893486f5209add5470e9,2025-06-23T20:16:21.633000
|
||||
@ -299316,10 +299333,16 @@ CVE-2025-6607,0,0,071f381785518009a18676f9af9bd7b4c2b9a573c6c5c874ad1d1316f11960
|
||||
CVE-2025-6608,0,0,0858fc7c00cdbc285bbe8079325f3a4b0970245a2843c57ccb766944542eaf3e,2025-06-25T15:15:27.907000
|
||||
CVE-2025-6609,0,0,84039b5dcbc2b7157233c59ff4ab97a30dcdb46f825a5ea7aa0dff139042bd2c,2025-06-25T15:15:28.100000
|
||||
CVE-2025-6610,0,0,80e7d7fe69fa52e2262fa8cac53bc563d69fe41cbef1a3bf59f9888a985aec0e,2025-06-25T15:15:28.297000
|
||||
CVE-2025-6611,1,1,1ad98d30a486a6dab1ae5e7fedb1bf38d56aaff036ac9a01e3d6742a9a3f7840,2025-06-25T16:15:27.233000
|
||||
CVE-2025-6612,1,1,056bd0a67196d47507d93cf7096ad81e5149c433bdf425eb50ffc2d6bcc8f1da,2025-06-25T16:15:27.413000
|
||||
CVE-2025-6611,0,0,1ad98d30a486a6dab1ae5e7fedb1bf38d56aaff036ac9a01e3d6742a9a3f7840,2025-06-25T16:15:27.233000
|
||||
CVE-2025-6612,0,0,056bd0a67196d47507d93cf7096ad81e5149c433bdf425eb50ffc2d6bcc8f1da,2025-06-25T16:15:27.413000
|
||||
CVE-2025-6613,0,0,8ae1b51e5fef4c67b5addca2893725bb67eb764eebc7fc2637e2d1a1b4322c09,2025-06-25T10:15:23.253000
|
||||
CVE-2025-6614,1,1,699f90622826178b52878c00830ce99df2740e016ef27e45d12e691a88445b84,2025-06-25T16:15:27.593000
|
||||
CVE-2025-6615,1,1,53ff9c5d44a8d339a501e11061ebcec50806e8b7c1667ec1e50d3bcda67bd7a3,2025-06-25T16:15:27.790000
|
||||
CVE-2025-6616,1,1,69e3d0b87c0a15bcc888ba109078758162c727a166b9e07eb51047379945f9a0,2025-06-25T17:15:40.280000
|
||||
CVE-2025-6617,1,1,69a437ef6870d59f3c2ba3c010071a735995948d72c1f0a5d65bea12dcb87390,2025-06-25T17:15:40.507000
|
||||
CVE-2025-6614,0,0,699f90622826178b52878c00830ce99df2740e016ef27e45d12e691a88445b84,2025-06-25T16:15:27.593000
|
||||
CVE-2025-6615,0,0,53ff9c5d44a8d339a501e11061ebcec50806e8b7c1667ec1e50d3bcda67bd7a3,2025-06-25T16:15:27.790000
|
||||
CVE-2025-6616,0,0,69e3d0b87c0a15bcc888ba109078758162c727a166b9e07eb51047379945f9a0,2025-06-25T17:15:40.280000
|
||||
CVE-2025-6617,0,0,69a437ef6870d59f3c2ba3c010071a735995948d72c1f0a5d65bea12dcb87390,2025-06-25T17:15:40.507000
|
||||
CVE-2025-6618,1,1,8f0f71c280554a7c818df3f61621fbe8f744cc190f41ed0b491a2c752a76b10a,2025-06-25T18:15:24.757000
|
||||
CVE-2025-6619,1,1,5c8159eab9352f8a3543f33ff16bfd3dc7f586f658a3ae25f3220f2ef1217cdb,2025-06-25T18:15:24.950000
|
||||
CVE-2025-6620,1,1,5b784a98374fe70ec4a1b100e40e03f67c67a52b666ca8120f8159e1f3e46978,2025-06-25T18:15:25.137000
|
||||
CVE-2025-6621,1,1,d3f259722de1f035956cfc786c4982bf87b78b61162bd5f14f24e3499d41dc2a,2025-06-25T18:15:25.310000
|
||||
CVE-2025-6627,1,1,eea8842b3eb9b3e1cf7456e6d24ea2786dc05d22ee014f3051caf23b6445a606,2025-06-25T19:15:24.260000
|
||||
CVE-2025-6678,1,1,3d8df884ccaa68204bde970fbc5a3e37b905ea9e2d3ab8e9d4e745c1411dc54e,2025-06-25T18:15:25.507000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user