From bdb52dabe620e128e10b218fda1f1b4cc9253c34 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 22 Jun 2025 18:04:39 +0000 Subject: [PATCH] Auto-Update: 2025-06-22T18:00:58.691065+00:00 --- CVE-2025/CVE-2025-64xx/CVE-2025-6482.json | 145 +++++++++++++++++++ CVE-2025/CVE-2025-64xx/CVE-2025-6483.json | 145 +++++++++++++++++++ CVE-2025/CVE-2025-64xx/CVE-2025-6484.json | 165 ++++++++++++++++++++++ CVE-2025/CVE-2025-64xx/CVE-2025-6485.json | 145 +++++++++++++++++++ README.md | 14 +- _state.csv | 12 +- 6 files changed, 615 insertions(+), 11 deletions(-) create mode 100644 CVE-2025/CVE-2025-64xx/CVE-2025-6482.json create mode 100644 CVE-2025/CVE-2025-64xx/CVE-2025-6483.json create mode 100644 CVE-2025/CVE-2025-64xx/CVE-2025-6484.json create mode 100644 CVE-2025/CVE-2025-64xx/CVE-2025-6485.json diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6482.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6482.json new file mode 100644 index 00000000000..0929bb5b065 --- /dev/null +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6482.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6482", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-22T16:15:24.093", + "lastModified": "2025-06-22T16:15:24.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /edituser-exec.php. The manipulation of the argument userid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rom4j/cve/issues/4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313590", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313590", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600689", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6483.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6483.json new file mode 100644 index 00000000000..448702f81d1 --- /dev/null +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6483.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6483", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-22T16:15:24.290", + "lastModified": "2025-06-22T16:15:24.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in code-projects Simple Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edituser.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/rom4j/cve/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313591", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313591", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600690", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6484.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6484.json new file mode 100644 index 00000000000..b7bfd0e8a29 --- /dev/null +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6484.json @@ -0,0 +1,165 @@ +{ + "id": "CVE-2025-6484", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-22T17:15:22.063", + "lastModified": "2025-06-22T17:15:22.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Online Shopping Store 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /action.php. The manipulation of the argument cat_id/brand_id/keyword/proId/pid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ez-lbz/poc/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ez-lbz/poc/issues/6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313592", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313592", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600694", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600702", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600704", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600705", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600707", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6485.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6485.json new file mode 100644 index 00000000000..01e8f38811a --- /dev/null +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6485.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6485", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-22T17:15:23.043", + "lastModified": "2025-06-22T17:15:23.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_34/34.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313593", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313593", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.600727", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3430c9f38ca..8b3fe99e075 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-22T16:00:52.108788+00:00 +2025-06-22T18:00:58.691065+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-22T15:15:20.830000+00:00 +2025-06-22T17:15:23.043000+00:00 ``` ### Last Data Feed Release @@ -33,17 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299042 +299046 ``` ### CVEs added in the last Commit Recently added CVEs: `4` -- [CVE-2025-6478](CVE-2025/CVE-2025-64xx/CVE-2025-6478.json) (`2025-06-22T14:15:21.467`) -- [CVE-2025-6479](CVE-2025/CVE-2025-64xx/CVE-2025-6479.json) (`2025-06-22T14:15:22.193`) -- [CVE-2025-6480](CVE-2025/CVE-2025-64xx/CVE-2025-6480.json) (`2025-06-22T15:15:20.030`) -- [CVE-2025-6481](CVE-2025/CVE-2025-64xx/CVE-2025-6481.json) (`2025-06-22T15:15:20.830`) +- [CVE-2025-6482](CVE-2025/CVE-2025-64xx/CVE-2025-6482.json) (`2025-06-22T16:15:24.093`) +- [CVE-2025-6483](CVE-2025/CVE-2025-64xx/CVE-2025-6483.json) (`2025-06-22T16:15:24.290`) +- [CVE-2025-6484](CVE-2025/CVE-2025-64xx/CVE-2025-6484.json) (`2025-06-22T17:15:22.063`) +- [CVE-2025-6485](CVE-2025/CVE-2025-64xx/CVE-2025-6485.json) (`2025-06-22T17:15:23.043`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 09fc5b0b199..af176ca11d0 100644 --- a/_state.csv +++ b/_state.csv @@ -299037,7 +299037,11 @@ CVE-2025-6474,0,0,3e39c8512816416fe8c7ddf5aaed888f37c2634d5d80b0be4ec720b4c35ad5 CVE-2025-6475,0,0,0344ea1c6e041c7440b343720387b9179b9f0e1cabde7f3aafb90f7057fbc66d,2025-06-22T12:15:20.747000 CVE-2025-6476,0,0,d7334e2904c03dcecdcfc40845defacdd1ecf8afbe242a8181c73133e9d019d9,2025-06-22T13:15:34.470000 CVE-2025-6477,0,0,c363fc749645eb9a46fb5c091844710d2d69ceadead07676b471ff8227d9ad79,2025-06-22T13:15:35.120000 -CVE-2025-6478,1,1,e86ea84207021fa44f32275e31374d82feb873262d1459f18c9a2e5fc8fad6ff,2025-06-22T14:15:21.467000 -CVE-2025-6479,1,1,87049c82e93ed13079449e8a426feaafd7bcde7e185f10e9339b40c6bd40b18b,2025-06-22T14:15:22.193000 -CVE-2025-6480,1,1,ac6d9565637ad4389fcc04e1bcce035789833b9f48dd1e237c00ebd5f3337e48,2025-06-22T15:15:20.030000 -CVE-2025-6481,1,1,9a19285023c33571e7763856c1a22a33c3489bb316b5f2a4cb5418639fb0865d,2025-06-22T15:15:20.830000 +CVE-2025-6478,0,0,e86ea84207021fa44f32275e31374d82feb873262d1459f18c9a2e5fc8fad6ff,2025-06-22T14:15:21.467000 +CVE-2025-6479,0,0,87049c82e93ed13079449e8a426feaafd7bcde7e185f10e9339b40c6bd40b18b,2025-06-22T14:15:22.193000 +CVE-2025-6480,0,0,ac6d9565637ad4389fcc04e1bcce035789833b9f48dd1e237c00ebd5f3337e48,2025-06-22T15:15:20.030000 +CVE-2025-6481,0,0,9a19285023c33571e7763856c1a22a33c3489bb316b5f2a4cb5418639fb0865d,2025-06-22T15:15:20.830000 +CVE-2025-6482,1,1,78387bba44ac09fbee211415a49a79664a437b6e640985cdc3eb90313186dcb7,2025-06-22T16:15:24.093000 +CVE-2025-6483,1,1,67de2bed11f228cf0694070dd76b14c3600456ceb91ea3259486298d9f88fe29,2025-06-22T16:15:24.290000 +CVE-2025-6484,1,1,33a4523a2eee6a3d0906d201bbbb401845815d10726c879dd2764368614481f6,2025-06-22T17:15:22.063000 +CVE-2025-6485,1,1,ded60fbb52c43c1ae95dc7eb194f7ec4cc8e18930c21e2ec8a8edeeed026021c,2025-06-22T17:15:23.043000