Auto-Update: 2025-05-28T02:00:19.259080+00:00

This commit is contained in:
cad-safe-bot 2025-05-28 02:03:56 +00:00
parent 9a63d2d0bb
commit c7c5de384e
30 changed files with 1816 additions and 217 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3669",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.487",
"lastModified": "2024-11-21T09:30:08.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:54:09.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.2",
"matchCriteriaId": "A76C0322-9500-4EB6-B10C-4574C576EB7C"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4096",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.723",
"lastModified": "2024-11-21T09:42:11.190",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:52:03.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdarko:responsive_tabs:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.0.11",
"matchCriteriaId": "6B431159-10A9-4EB8-9E3A-1A3C3AE3672F"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-48702",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:22.910",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:40:19.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPGurukul Old Age Home Management System v1.0 is vulnerable to HTML Injection via the searchdata parameter."
},
{
"lang": "es",
"value": "PHPGurukul Old Age Home Management System v1.0 es vulnerable a la inyecci\u00f3n de HTML a trav\u00e9s del par\u00e1metro searchdata."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:old_age_home_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1696E8-13EF-409E-BF90-C092ABEDFE50"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51101",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.093",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:42:23.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPGURUKUL Restaurant Table Booking System using PHP and MySQL v1.0 was discovered to contain a SQL injection vulnerability via the searchdata parameter at /rtbs/check-status.php."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que HPGURUKUL Restaurant Table Booking System que utiliza PHP y MySQL v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro searchdata en /rtbs/check-status.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02963BE3-61BC-41D5-82BA-71B773AA8FA0"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Restaurant%20Table%20Booking%20System%20using%20PHP%20and%20MySQL/SQL%20Injection-Search.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51106",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-19T15:15:22.583",
"lastModified": "2025-05-21T20:25:33.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:00:45.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-About%20Us.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51107",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.267",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:44:54.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /mcgs/admin/contactus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle, pagedes, and email parameters."
},
{
"lang": "es",
"value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en el componente /mcgs/admin/contactus.php de PHPGURUKUL Medical Card Generation System que utiliza PHP y MySQL v1.0 permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los par\u00e1metros pagetitle, pagedes y email."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Contact%20Us.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51108",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.440",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:44:07.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /admin/card-bwdates-report.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the fromdate and todate parameters."
},
{
"lang": "es",
"value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en el componente /admin/card-bwdates-report.php de PHPGURUKUL Medical Card Generation System que utiliza PHP y MySQL v1.0 permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los par\u00e1metros fromdate y todate."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Between%20Dates%20Reports.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5765",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.823",
"lastModified": "2024-11-21T09:48:18.090",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:51:15.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpstickybar:wpstickybar:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.0",
"matchCriteriaId": "8A1E549D-DFF7-4E99-950B-DD3E7B510DAC"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5807",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.917",
"lastModified": "2024-11-21T09:48:22.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:50:36.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esterox:business_card:1.0.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "FB387573-2EBF-44FB-8B7F-F9D721E6CFC4"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5808",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.070",
"lastModified": "2024-11-21T09:48:22.213",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:49:06.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:masdiblogs:wp_ajax_contact_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.2",
"matchCriteriaId": "06F5E471-517C-49CA-9F13-AA736C4BC7C8"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5809",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.180",
"lastModified": "2024-11-21T09:48:22.387",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:46:20.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:masdiblogs:wp_ajax_contact_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.2",
"matchCriteriaId": "06F5E471-517C-49CA-9F13-AA736C4BC7C8"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5975",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.277",
"lastModified": "2024-11-21T09:48:40.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T00:42:32.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:contrive:cz_loan_management:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1",
"matchCriteriaId": "017403BA-0D67-447D-B098-EB04B99796DB"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4816",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T04:16:20.577",
"lastModified": "2025-05-19T16:15:33.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T00:59:43.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309273",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309273",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.574129",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/8",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4817",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T04:16:20.797",
"lastModified": "2025-05-19T16:15:33.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T00:59:22.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/9",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309274",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309274",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.574178",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/9",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4818",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T05:15:51.597",
"lastModified": "2025-05-19T16:15:34.087",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T00:58:53.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/10",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309275",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309275",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.574219",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/10",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4938",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T16:15:36.407",
"lastModified": "2025-05-21T20:25:16.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:33:36.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WuYanneko/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.309500",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309500",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.579848",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4939",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T16:15:36.620",
"lastModified": "2025-05-21T20:25:16.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:32:20.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,32 +142,82 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:credit_card_application_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0BFAAD8-0306-420B-B06D-F23D04AB2072"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.309502",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309502",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580119",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4941",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T17:15:28.883",
"lastModified": "2025-05-21T20:25:16.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:31:03.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:credit_card_application_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0BFAAD8-0306-420B-B06D-F23D04AB2072"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GIRISH05/Credit-card-application-management-system/blob/main/SQL-Injection.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.309504",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309504",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580167",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T22:15:19.410",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:25:25.310",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE80DE6-C79F-452F-9523-4EC1F9777DA4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/laifeng-boy/cve/issues/5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309657",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309657",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580192",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/laifeng-boy/cve/issues/5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T22:15:19.600",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:24:21.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,78 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/huangyi234/CVE/issues/4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309658",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309658",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580195",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
},
{
"url": "https://github.com/huangyi234/CVE/issues/4",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:19.530",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:20:50.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,77 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/huangyi234/CVE/issues/8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309659",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309659",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580201",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/huangyi234/CVE/issues/8",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:19.750",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:16:17.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Zhaozhizhi/CVE/issues/3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309660",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.309660",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580248",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Zhaozhizhi/CVE/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:20.133",
"lastModified": "2025-05-21T23:15:55.200",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:06:49.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,77 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hhhanxx/attack/issues/18",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309662",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309662",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580412",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/hhhanxx/attack/issues/18",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T14:16:09.230",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:53:25.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GeniusWang23/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309957",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.309957",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581431",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/GeniusWang23/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T14:16:09.523",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:52:35.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GeniusWang23/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309958",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309958",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581432",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/GeniusWang23/CVE/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T15:16:06.477",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:50:48.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dico-Z/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309959",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309959",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581439",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5081",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T16:15:56.697",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:49:27.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:cybercafe_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76B02852-BBA6-49C7-82F9-A92F2DBFC0A5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wzylky/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309961",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309961",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.582065",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/wzylky/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5278",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-05-27T21:15:23.197",
"lastModified": "2025-05-27T21:15:23.197",
"lastModified": "2025-05-28T01:15:19.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368764",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/05/27/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-05-27T23:55:19.472504+00:00
2025-05-28T02:00:19.259080+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-05-27T23:15:21.400000+00:00
2025-05-28T01:53:25.660000+00:00
```
### Last Data Feed Release
@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-05-27T00:00:04.320074+00:00
2025-05-28T00:00:04.313451+00:00
```
### Total Number of included CVEs
@ -38,22 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `0`
- [CVE-2022-21150](CVE-2022/CVE-2022-211xx/CVE-2022-21150.json) (`2025-05-27T23:15:19.840`)
- [CVE-2022-21200](CVE-2022/CVE-2022-212xx/CVE-2022-21200.json) (`2025-05-27T23:15:20.490`)
- [CVE-2024-11185](CVE-2024/CVE-2024-111xx/CVE-2024-11185.json) (`2025-05-27T23:15:20.580`)
- [CVE-2024-45094](CVE-2024/CVE-2024-450xx/CVE-2024-45094.json) (`2025-05-27T23:15:21.093`)
- [CVE-2025-2796](CVE-2025/CVE-2025-27xx/CVE-2025-2796.json) (`2025-05-27T23:15:21.283`)
- [CVE-2025-2826](CVE-2025/CVE-2025-28xx/CVE-2025-2826.json) (`2025-05-27T23:15:21.400`)
- [CVE-2025-32440](CVE-2025/CVE-2025-324xx/CVE-2025-32440.json) (`2025-05-27T22:15:21.980`)
- [CVE-2025-40911](CVE-2025/CVE-2025-409xx/CVE-2025-40911.json) (`2025-05-27T22:15:22.337`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `28`
- [CVE-2024-51101](CVE-2024/CVE-2024-511xx/CVE-2024-51101.json) (`2025-05-28T01:42:23.560`)
- [CVE-2024-51106](CVE-2024/CVE-2024-511xx/CVE-2024-51106.json) (`2025-05-28T01:00:45.410`)
- [CVE-2024-51107](CVE-2024/CVE-2024-511xx/CVE-2024-51107.json) (`2025-05-28T01:44:54.320`)
- [CVE-2024-51108](CVE-2024/CVE-2024-511xx/CVE-2024-51108.json) (`2025-05-28T01:44:07.960`)
- [CVE-2024-5765](CVE-2024/CVE-2024-57xx/CVE-2024-5765.json) (`2025-05-28T00:51:15.270`)
- [CVE-2024-5807](CVE-2024/CVE-2024-58xx/CVE-2024-5807.json) (`2025-05-28T00:50:36.617`)
- [CVE-2024-5808](CVE-2024/CVE-2024-58xx/CVE-2024-5808.json) (`2025-05-28T00:49:06.347`)
- [CVE-2024-5809](CVE-2024/CVE-2024-58xx/CVE-2024-5809.json) (`2025-05-28T00:46:20.463`)
- [CVE-2024-5975](CVE-2024/CVE-2024-59xx/CVE-2024-5975.json) (`2025-05-28T00:42:32.570`)
- [CVE-2025-4816](CVE-2025/CVE-2025-48xx/CVE-2025-4816.json) (`2025-05-28T00:59:43.940`)
- [CVE-2025-4817](CVE-2025/CVE-2025-48xx/CVE-2025-4817.json) (`2025-05-28T00:59:22.280`)
- [CVE-2025-4818](CVE-2025/CVE-2025-48xx/CVE-2025-4818.json) (`2025-05-28T00:58:53.250`)
- [CVE-2025-4938](CVE-2025/CVE-2025-49xx/CVE-2025-4938.json) (`2025-05-28T01:33:36.677`)
- [CVE-2025-4939](CVE-2025/CVE-2025-49xx/CVE-2025-4939.json) (`2025-05-28T01:32:20.263`)
- [CVE-2025-4941](CVE-2025/CVE-2025-49xx/CVE-2025-4941.json) (`2025-05-28T01:31:03.773`)
- [CVE-2025-5002](CVE-2025/CVE-2025-50xx/CVE-2025-5002.json) (`2025-05-28T01:25:25.310`)
- [CVE-2025-5003](CVE-2025/CVE-2025-50xx/CVE-2025-5003.json) (`2025-05-28T01:24:21.800`)
- [CVE-2025-5004](CVE-2025/CVE-2025-50xx/CVE-2025-5004.json) (`2025-05-28T01:20:50.517`)
- [CVE-2025-5006](CVE-2025/CVE-2025-50xx/CVE-2025-5006.json) (`2025-05-28T01:16:17.537`)
- [CVE-2025-5008](CVE-2025/CVE-2025-50xx/CVE-2025-5008.json) (`2025-05-28T01:06:49.867`)
- [CVE-2025-5077](CVE-2025/CVE-2025-50xx/CVE-2025-5077.json) (`2025-05-28T01:53:25.660`)
- [CVE-2025-5078](CVE-2025/CVE-2025-50xx/CVE-2025-5078.json) (`2025-05-28T01:52:35.277`)
- [CVE-2025-5079](CVE-2025/CVE-2025-50xx/CVE-2025-5079.json) (`2025-05-28T01:50:48.303`)
- [CVE-2025-5081](CVE-2025/CVE-2025-50xx/CVE-2025-5081.json) (`2025-05-28T01:49:27.430`)
- [CVE-2025-5278](CVE-2025/CVE-2025-52xx/CVE-2025-5278.json) (`2025-05-28T01:15:19.730`)
## Download and Usage

View File

@ -190949,7 +190949,7 @@ CVE-2022-21147,0,0,53d42dff0ef971348abcbc9db3dccf42503f1205f0d61cae322fa8f9ff752
CVE-2022-21148,0,0,b4c937e47978f11ca1e16a1b6d1e86246877646fa0a67f66ccb9ef23bf990279,2025-05-05T17:17:39.760000
CVE-2022-21149,0,0,f3ae7567f3163786b900eb1a79db504939c5f01724410c388a986c59598624bd,2024-11-21T06:43:59.437000
CVE-2022-2115,0,0,3b0bfd60b400c603906316aedf310160bb240d4946ebcce85d7d85bb339ae37f,2024-11-21T07:00:20.630000
CVE-2022-21150,1,1,73af99be2ef6a1ec107afd973e876751c4cf1c849a91a5dd04fc97fab1a97ff6,2025-05-27T23:15:19.840000
CVE-2022-21150,0,0,73af99be2ef6a1ec107afd973e876751c4cf1c849a91a5dd04fc97fab1a97ff6,2025-05-27T23:15:19.840000
CVE-2022-21151,0,0,93b633642443edbb9a618ccace777742cd46371866dc45008734687fd210c4dd,2025-05-05T17:17:40
CVE-2022-21152,0,0,b6f1363434b71ccba44723b7c847dbfe5b198e98e7a674346d2e8d4b0c919e50,2025-05-05T17:17:40.817000
CVE-2022-21153,0,0,e312384a9ce26d515b19347cf80988cd1c5474a1f90514b58bfd29acb0034b59,2025-05-05T17:17:41.043000
@ -190998,7 +190998,7 @@ CVE-2022-21197,0,0,c84dea9b93bfc978b5467cd9a739ece8f41846103bdb2c6925cfc7478a3ef
CVE-2022-21198,0,0,1155a641fdf7c6c1229127e6fa4a1cc634cfb76a3942f96e24ba77fb0ceba70d,2025-02-04T18:15:29.893000
CVE-2022-21199,0,0,055fbcd11322cba3f7403cdce3bd9e8bbf4128df212ffbe4213a9fc5a19eef15,2024-11-21T06:44:05.567000
CVE-2022-2120,0,0,91491aa789c8d3e8f5740c6d2ca2cda651b114390fe24ccd573921c535e94c1f,2024-11-21T07:00:21.197000
CVE-2022-21200,1,1,0576b98bc61e8e27aaba7204bd609fefc4e419ef74671c40c0e5fe1246dae388,2025-05-27T23:15:20.490000
CVE-2022-21200,0,0,0576b98bc61e8e27aaba7204bd609fefc4e419ef74671c40c0e5fe1246dae388,2025-05-27T23:15:20.490000
CVE-2022-21201,0,0,a4e0197e75f2936b3b645b102670e01ddad1b696e4e752b3e65628adb198be0a,2024-11-21T06:44:05.670000
CVE-2022-21202,0,0,de1464aa17fa964c60b8c29cf8a7e5dc40be4a6ba7d04f8662a1c3aa6b2bd546,2024-11-21T06:44:05.777000
CVE-2022-21203,0,0,54568b987437a847f5d31726a301236c617930ea9392a11177e819c0241828a7,2025-05-05T17:17:43.880000
@ -246093,7 +246093,7 @@ CVE-2024-11181,0,0,a6b77044e6509fe3aca0bf2fdf8735020e45d95ff8f1e77d85c770a6e50da
CVE-2024-11182,0,0,fcbf84d76bd0ec5a6be96e0f2f3367a28021db9502432aff67df27ded6f18f2e,2025-05-21T18:44:12.623000
CVE-2024-11183,0,0,38a79fdf028e6d076b0c9ce59b96b7c75f295dd059f7e0b8602ad289d643763d,2025-05-06T21:25:00.510000
CVE-2024-11184,0,0,95b60c199ec8feaed7403cfeaeb615c0adf5827564743c751fc62910137c62e9,2025-01-06T21:15:13.693000
CVE-2024-11185,1,1,c6a17314ee52960d01f698ab8cdbbaad5a9c6a5fb6b7f626a2200ccec27553af,2025-05-27T23:15:20.580000
CVE-2024-11185,0,0,c6a17314ee52960d01f698ab8cdbbaad5a9c6a5fb6b7f626a2200ccec27553af,2025-05-27T23:15:20.580000
CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000
CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000
CVE-2024-11188,0,0,8070c22ab1552d28f4790f36fbb035b9ddec6883502131d83e84861dfa7e75e7,2024-11-23T06:15:17.570000
@ -262550,7 +262550,7 @@ CVE-2024-36681,0,0,96c1846f583101f7866c8fadfdf3a33b81ffcf4e96d0387c413dba15329c6
CVE-2024-36682,0,0,cb2995f0242062cfca7bdf65500013048768a2b6d65b1c25e30172054d0e0139,2024-11-21T09:22:32.397000
CVE-2024-36683,0,0,be595454ef8171db03a002d73c28446849c4fd224f6bc90a988dfe37de330fdc,2024-11-21T09:22:32.600000
CVE-2024-36684,0,0,8fab043b3364ae1eeedff575a1f0cbfbc03fa998f9cc28dd8bada425bf4a8acf,2024-11-21T09:22:32.807000
CVE-2024-3669,0,0,48e93d834169209b4a3103f1fa3909fb6e7a831db81a3ba76b06d37b3e787c9a,2024-11-21T09:30:08.690000
CVE-2024-3669,0,1,bf0d428440354671ae9f717d945ef28e9e393ce50c7ad5fdcc16412f8b06faf2,2025-05-28T00:54:09.360000
CVE-2024-36691,0,0,3dfc8ca2b0f56703968ad393c59292478596f8672b0393464c33aed3c63780aa,2024-11-21T09:22:33.040000
CVE-2024-36694,0,0,97e39bbb6c67fa2d3fcd0bc2d169d009680f66af761bc61f98a7f5a4b2e194ab,2025-04-22T15:36:02.527000
CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000
@ -265857,7 +265857,7 @@ CVE-2024-40956,0,0,f35dc66c569773537c41655b5b868e59e721e8f7ff6809d21084628e699c0
CVE-2024-40957,0,0,8c88dfffe800e3d85344951840f64f97a55eebeb79655fdcb09982a38c3f76d5,2024-11-21T09:31:56.810000
CVE-2024-40958,0,0,7495d58e5b81955176212788f60f87330a2e9c6bce5c3dd26de405b05b1f6533,2024-11-21T09:31:56.947000
CVE-2024-40959,0,0,0043be57531474631cc6de7737512d2ab0230deb9269189d29b950369a0fd17c,2024-11-21T09:31:57.090000
CVE-2024-4096,0,0,8de4935f6098b6eef1effebea5690d7854065723072ff76e21cbe24e62d668df,2024-11-21T09:42:11.190000
CVE-2024-4096,0,1,a6100502a92d8a5a161d019b647bc5dcd282882af1f3f803f74e649aaeea854a,2025-05-28T00:52:03.347000
CVE-2024-40960,0,0,d1b260bce7a6f4e3918591cefa3fd644d2061253ecfc0dec1722a192d1703af2,2024-11-21T09:31:57.263000
CVE-2024-40961,0,0,c323f131dac03e8f3736a795ce92c772336b6ee895d5ed1507aa424851c01204,2024-11-21T09:31:57.413000
CVE-2024-40962,0,0,1b32e5be99ff36031e51ef4af62c32f3376ebee25aa8774ef70b4bd4ef137e55,2025-01-07T16:10:10.253000
@ -269051,7 +269051,7 @@ CVE-2024-45088,0,0,1beec48fbebe975f8bc73123f865d04a7ed8df665a2d4af27f0cdfaad4366
CVE-2024-45089,0,0,542dfbf973be63b03ff718a4f3a8fab91d5b396d4bcab48b662c4f8c45834b4d,2025-03-05T18:26:20.030000
CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000
CVE-2024-45091,0,0,15b0a69c48e3ad122ef5c06eab93e452421cc3bec77edca18bcd67201ac2adaa,2025-01-29T21:12:41.107000
CVE-2024-45094,1,1,eac2452d1432b4c60a27953b2742ccdca4fbe302b18c5bcd9565d7950844128a,2025-05-27T23:15:21.093000
CVE-2024-45094,0,0,eac2452d1432b4c60a27953b2742ccdca4fbe302b18c5bcd9565d7950844128a,2025-05-27T23:15:21.093000
CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000
CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eeaa37,2024-09-06T12:51:59.750000
CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000
@ -271610,7 +271610,7 @@ CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7
CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000
CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000
CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000
CVE-2024-48702,0,0,307b904a666af6813868acd076c344b88453ac52a59c26a56b076304996e11e6,2025-05-23T15:54:42.643000
CVE-2024-48702,0,1,01ea8d7d8d70b95471496eea8001e6b5bc98a75e9594313b9cf5383c4cf9d75b,2025-05-28T01:40:19.143000
CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000
CVE-2024-48704,0,0,3893d860c5cbcfcb221edb7b511c8425d1a2b0fa61906308ba9350b2db11e150,2025-05-23T16:15:24.403000
CVE-2024-48706,0,0,c943b13c3a3939cb5d8b86b065bc2ddde43d7d1c2b6d276f98ff2b2d6bbb9294,2025-03-25T17:16:11.580000
@ -273566,12 +273566,12 @@ CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c
CVE-2024-51094,0,0,428eba4d2b25aa4f0722ef2b3d4daef54792a17342b2b8a3a1bd37dc73e6ba77,2025-05-22T17:28:00.107000
CVE-2024-51099,0,0,76299d701a4a326304643950fc6a06063189d1cf898039e5e4a1de0b1cac5f1f,2025-05-23T16:15:24.527000
CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000
CVE-2024-51101,0,0,fec8dd28bebab4662ba2a4d707a6d12c68a1d678f538f5ab886249855c7a1999,2025-05-23T15:54:42.643000
CVE-2024-51101,0,1,e4d47c0080321b806c8f657e0373e6db1fc5c5309326af02b3039c69f02cb6f9,2025-05-28T01:42:23.560000
CVE-2024-51102,0,0,97831955bfdf9790880422aa6ef84b830a8bb4e25861ffcd032c1ac1a29b89ef,2025-05-23T19:15:21.220000
CVE-2024-51103,0,0,f4b83b954d67fa14dd00f188cb7911f528eb31c3009429b0a9d4991a04725b3d,2025-05-23T16:15:24.643000
CVE-2024-51106,0,0,b4f066c6258fb1ca79f53921624ad8ee81faf462bcf70c6ebe65131d490bc5b7,2025-05-21T20:25:33.823000
CVE-2024-51107,0,0,d688abae21c988868a73bc1ff17121c383b72a833d19b71da23855711720f40e,2025-05-23T15:54:42.643000
CVE-2024-51108,0,0,40947e231ab684dad8551f526deae7e614b95f3363b2d658df8b035009d3076b,2025-05-23T15:54:42.643000
CVE-2024-51106,0,1,52316175fd89c5253300b2e14d9e26b21a88903277d9d4c00394f347fe89ca33,2025-05-28T01:00:45.410000
CVE-2024-51107,0,1,cbf01b3eee34c7b5a0cd560312505110cfa6f6be423a19b9a60a07d3542da8c4,2025-05-28T01:44:54.320000
CVE-2024-51108,0,1,70e9fc6e5f619b67ea5feb94e2f056d89d4c926a188193efb96358eb6c910327,2025-05-28T01:44:07.960000
CVE-2024-5111,0,0,afdc374c63208154122a1e480b379bf8aece87015a21eb603ff3e335d14b6fef,2025-02-21T20:09:47.700000
CVE-2024-51111,0,0,1b60f534839740b969e5474b088b0887cce9ab6321e3570e84fbd1d3290a378d,2025-01-06T18:15:20.060000
CVE-2024-51112,0,0,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000
@ -277806,7 +277806,7 @@ CVE-2024-57646,0,0,a888cdd5365c2b8dea460aeb56378a7623ae682bc07a8d0f9dec38273c362
CVE-2024-57647,0,0,d3984558393252e3df3fb667ed5c80aa1b991a2d6bc9d98908f75cf9cd4397fa,2025-04-17T16:47:19.220000
CVE-2024-57648,0,0,b7c7dc7ebc32322874d38b1745b034b539148709438f93be252e21212efcaa79,2025-04-17T16:47:16.813000
CVE-2024-57649,0,0,a90ba56c8166c25edf0ef2f87243dc95641782e6dd10bd8cd0ce7bb7dd78c660,2025-04-17T16:47:14.280000
CVE-2024-5765,0,0,8bc2294d6d7af965be603f90c65d8cabf573a7f7fa01fb8de5ef7a7fb2539707,2024-11-21T09:48:18.090000
CVE-2024-5765,0,1,92c5d8c017efa62598245e2a40eb941bba381c9d8565f04d08f00539e71e0cb2,2025-05-28T00:51:15.270000
CVE-2024-57650,0,0,d5ed05d0d2ef6d6244f24ea302a427ad0877aa33635ccb941889bd4ce3686559,2025-04-17T16:47:11.903000
CVE-2024-57651,0,0,62b1065be744d99f48fea1a3e7658cb0a92f791d0c8c9d29d94c4ab0ff0cc35a,2025-04-17T16:47:08.997000
CVE-2024-57652,0,0,8f20d5782dd9506a7196df3ec7850b57fabff337caf79c5adae6fcd0cd231a9e,2025-04-17T16:47:05.030000
@ -278127,7 +278127,7 @@ CVE-2024-58066,0,0,c6e3b768d006a4e502266d5440a1292003cf4ce5373a8e00bedbdf635b758
CVE-2024-58067,0,0,539fcaa5844135d8382de5294a58afb3d718ddb2522286dde14d2eb07f695970,2025-03-25T14:44:00.237000
CVE-2024-58068,0,0,c4222890e8d1bb8a6fd55e01d09dd9d69c7567be1d440d26b5a5d79630a65f7d,2025-03-25T14:47:07.467000
CVE-2024-58069,0,0,e74d8cad603e1620e828d4b3caac6e0ceb942144c73e5c456889b854714ef962,2025-03-25T14:48:40.760000
CVE-2024-5807,0,0,e39b8ad5e228368927b79aa56a54eaa43f3eaa14a89129cbf854c403a97f91d8,2024-11-21T09:48:22.057000
CVE-2024-5807,0,1,d4be4262d40bde5347e31b02a8283ace048206bfcacb514bc578a69101017b51,2025-05-28T00:50:36.617000
CVE-2024-58070,0,0,9c89d9904014e5d004d59e1f69fe53f6a2ec8e42ab0e66d5da1feebbb233b551,2025-03-25T14:21:57.697000
CVE-2024-58071,0,0,aab391a33ed2ebaff184b9ec4086049e627ecb3ac5f43dfc6d2aa871d74b66dc,2025-03-25T14:22:11.633000
CVE-2024-58072,0,0,d52e0da3f5c91d03028994ae6c07bb11e0728d624ff7bdc5d9ccc3a65443e2c9,2025-03-13T13:15:45.920000
@ -278138,7 +278138,7 @@ CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a1
CVE-2024-58077,0,0,f3ec17f492afe830e4bdffec9ee6935e46e28e5e78af48de044da0a78231897b,2025-03-06T17:15:21.123000
CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000
CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000
CVE-2024-5808,0,0,5a73a5618425d1f2d9eaf1f173cdff3fa455743e0b010bcc63eccd6f6e0c1652,2024-11-21T09:48:22.213000
CVE-2024-5808,0,1,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000
CVE-2024-58080,0,0,e3835bb895176f76b9629f1f45e7a50098fa6dc90a8d8933f702379f8bdec271,2025-03-25T14:27:18.737000
CVE-2024-58081,0,0,d14fd97d756a1cf5956e0eb5be64ade4f19b40adbeb5fcfa6440435351f38eb0,2025-03-25T14:27:38.820000
CVE-2024-58082,0,0,2224c338aeba3c6f1f3d7b825286f63e7ba1be753f0574b81f01302121977acc,2025-03-06T17:15:21.677000
@ -278149,7 +278149,7 @@ CVE-2024-58086,0,0,f1395b9bc6450b1446434126a0cdece082421cfdb9c768edd21ee2aefff1d
CVE-2024-58087,0,0,04a36bf48b3a2cdfea7da85ab1709b6a14fc57278f19e47877c4e4a8b19d5d33,2025-03-13T16:22:01.067000
CVE-2024-58088,0,0,548028057d678538b0d3a9c3c915640aea1986564c6a81f45d90000c55bd6831,2025-03-13T16:21:33.877000
CVE-2024-58089,0,0,c539e21863bf6d808e8f03e17c4063f4cf474cdca947eadd829ab37d0ca02025,2025-03-13T16:21:17.030000
CVE-2024-5809,0,0,0a5bf6a9d99e27af5b5a00b47f9d494997d7ec310ddf537ead1dec78e82e93bd,2024-11-21T09:48:22.387000
CVE-2024-5809,0,1,c4b8b59104f068ec24124c9d818f6d627fb564dbf53494b008a39765c54f9477,2025-05-28T00:46:20.463000
CVE-2024-58090,0,0,5d5a772ef85a7d7cf1764ffd3f4d817a84bbc6475cefed9abaaa898b75cace7a,2025-03-27T16:45:12.210000
CVE-2024-58091,0,0,bdb73265ec2113004990c5b046492ea3ca27cffddbcbc776a99f7489adfd4d1b,2025-03-27T16:45:12.210000
CVE-2024-58092,0,0,53f31227bd07354c6c789ed76152b430dbc15e4ab3c96f0045d950ec318a2250,2025-04-16T13:25:37.340000
@ -278354,7 +278354,7 @@ CVE-2024-5971,0,0,f03f53869694442f097b92cf60ccdd932b1bd24804d85a21f37d5d1a934565
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5973,0,0,5764fe7dba8a714456e598c82d1ba942598616db44809839e67ac1f6bf90f970,2024-11-21T09:48:40.297000
CVE-2024-5974,0,0,d125bc9130d6cdb44d098f1dba162d025003a48ce6f65b23901cdc8d897e2e84,2025-01-13T18:15:19.697000
CVE-2024-5975,0,0,1540d9cf16be3cdaab49810d2c22343710e6ed2f67972005f1fcea70f1fac8ea,2024-11-21T09:48:40.623000
CVE-2024-5975,0,1,3be3b53e1dab5331d0640ddf4a1f3b483a49f7699ffb58531a66efe441ae4f11,2025-05-28T00:42:32.570000
CVE-2024-5976,0,0,87c7e0aaf6cd0dcd3015a44e98f6c6317c749221800441ee90e6991faaa5d21d,2024-11-21T09:48:40.793000
CVE-2024-5977,0,0,909876bcbf4f2ad2839dc39ff9f402926337af028be37025b6a8c86d94af7f35,2024-11-21T09:48:40.960000
CVE-2024-5979,0,0,af718dd6f9c3a56a817df80eecdb8156b18063e36e493393439a223ddf585359,2024-11-21T09:48:41.093000
@ -289357,7 +289357,7 @@ CVE-2025-27937,0,0,46e59abc87395fad933022253638fee740418314c08fa44c43852bb835ed4
CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000
CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000
CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000
CVE-2025-2796,1,1,0fbb630e2abe61aade417421e28e8d980bbaee928d1afe4ed72e70bd3970f2ae,2025-05-27T23:15:21.283000
CVE-2025-2796,0,0,0fbb630e2abe61aade417421e28e8d980bbaee928d1afe4ed72e70bd3970f2ae,2025-05-27T23:15:21.283000
CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000
CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000
CVE-2025-27980,0,0,d2f5f5ebada616a2bc11216168eecc9bced7938b2c036a22eb2533c1949980c8,2025-05-22T15:53:24.823000
@ -289470,7 +289470,7 @@ CVE-2025-2825,0,0,e4db2ec87b94dcda703a7cb29d9641a787a1d84d05d6f964d3ea9c8b54dfc7
CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000
CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18
CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
CVE-2025-2826,1,1,cde927b828c92118110a503a691e114965c68db4bf88b439a0626463e4906f70,2025-05-27T23:15:21.400000
CVE-2025-2826,0,0,cde927b828c92118110a503a691e114965c68db4bf88b439a0626463e4906f70,2025-05-27T23:15:21.400000
CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000
CVE-2025-2830,0,0,18f5acbcc1908730340a8cc830c427c3344653036d2c90e6b125301c8343cff5,2025-04-15T19:16:07.927000
CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000
@ -291905,7 +291905,7 @@ CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000
CVE-2025-3244,0,0,83385a875e2316aa8147e21cd040f4a5fd2ca8ba35219f944564cb0a256174d9,2025-05-14T21:07:17.220000
CVE-2025-32440,1,1,7687ef0eb2c76bab0ab5f35300721a80b41ea3da13903bdea0b6cb12719c2349,2025-05-27T22:15:21.980000
CVE-2025-32440,0,0,7687ef0eb2c76bab0ab5f35300721a80b41ea3da13903bdea0b6cb12719c2349,2025-05-27T22:15:21.980000
CVE-2025-32441,0,0,5d96695d99df210c451cb1297434489aa5ccf2a218059c2922743ca7b2a18209,2025-05-08T14:39:09.683000
CVE-2025-32442,0,0,3d727ddd988064a7ed8b991fa369d7c4d417f02766d256143d6103e1f774327c,2025-04-28T18:15:48.393000
CVE-2025-32444,0,0,040bc0b93f2555e371bd992e022bc009bca8f15a87bedbd2890deefa7d9aa25f,2025-05-02T13:53:40.163000
@ -293603,7 +293603,7 @@ CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b
CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000
CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000
CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000
CVE-2025-40911,1,1,5d617aa4f3c4bdbc7ab0031b95d2c6f4ae3adc9c4e4ba8d678d8f4330717f313,2025-05-27T22:15:22.337000
CVE-2025-40911,0,0,5d617aa4f3c4bdbc7ab0031b95d2c6f4ae3adc9c4e4ba8d678d8f4330717f313,2025-05-27T22:15:22.337000
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000
CVE-2025-4094,0,0,c4366c891a9ac824ae6e9d82e5a7df040ca58b43955f28a6e84c485206c2a693,2025-05-21T23:15:54.973000
@ -295220,11 +295220,11 @@ CVE-2025-4814,0,0,701ab03b7a876ef5bc2e1ad888c3ec9b57b3290dbffe826cdd00c807fcd57d
CVE-2025-48144,0,0,d64923e40fdc0e7e404ab923fc3419b37f7c428f4d5f5c57ca1b8c036d0841cc,2025-05-19T13:35:20.460000
CVE-2025-48146,0,0,ab7aa4605de119e1b098c976e2765794696963be887a36cad3a72cd3dfef653e,2025-05-19T13:35:20.460000
CVE-2025-4815,0,0,d56932e9d68c28e8c84ba9340c5fe206f8693cbef9a54e1900a1c0e6a352f201,2025-05-19T16:15:33.753000
CVE-2025-4816,0,0,f14c1cfb83c8c6ed9a0698dfcc95775ad36a530b7fdf1e45228f3250bfb98f58,2025-05-19T16:15:33.863000
CVE-2025-4817,0,0,dd10739a15af78c4705e3e00a519aed353f304d46b521ddf484b8fc0fc2938a8,2025-05-19T16:15:33.977000
CVE-2025-4816,0,1,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000
CVE-2025-4817,0,1,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000
CVE-2025-48174,0,0,f26469907442315e96b5feb9308b03c4506fc8074c00574b934b171f795f26df,2025-05-16T14:42:18.700000
CVE-2025-48175,0,0,3f6bab737596fdb5634db37c0296a1b165ba48ea379824d01c7b1ce82612cf5b,2025-05-16T14:42:18.700000
CVE-2025-4818,0,0,65473837bd1909e5e7f653a7d28de0873bcc16d5c4c178e6d14886f055e06866,2025-05-19T16:15:34.087000
CVE-2025-4818,0,1,46d731a7fb69ff2dcbbabe2b3a403a7f0fce04438dcb8f5cef1cb1fefa0dfdd7,2025-05-28T00:58:53.250000
CVE-2025-48187,0,0,be9d0afeae04913d345ed4d335591274c105e6700369ecf88b41657ac12d62eb,2025-05-19T16:15:30.853000
CVE-2025-48188,0,0,9338f093747813e06d902a44455aea29fdf3a611a5e401cd7c2e67e28da8d86c,2025-05-19T13:35:20.460000
CVE-2025-4819,0,0,49caec14472d9713a5e005512e05ab68ec95bbd6e0ab80b85d595ebe6722e2cc,2025-05-19T13:35:20.460000
@ -295460,10 +295460,10 @@ CVE-2025-4934,0,0,223d290223d766bd8fadc58a50b1e245df2a17d05c7a82ae8c467c7317c633
CVE-2025-4935,0,0,0924c431ea344338f09c6746a2eb896f1051ac5651ba0c066119ecf4a65489d5,2025-05-21T20:25:33.823000
CVE-2025-4936,0,0,52f00703e856a8895a4ad73331c7e04059651f0c33578ef1dfde1a53c8bf17d2,2025-05-21T20:25:33.823000
CVE-2025-4937,0,0,04c10f6938329dfd4cb4a045dea1d120d3485da87d3dc89f52a5fd817e2ecd60,2025-05-21T20:25:33.823000
CVE-2025-4938,0,0,869000ce212a95a4f151806c116520d3892cf0d02e418337c2a222fe633e7492,2025-05-21T20:25:16.407000
CVE-2025-4939,0,0,900a9898cac9c0072a6851a87a1fc394fc59a43f240149c960c6ba983fe7fa0a,2025-05-21T20:25:16.407000
CVE-2025-4938,0,1,9bfbb8aefdfbb754eacbb83a30a05c557a118de2c85e31be873a9e69bcb3eeca,2025-05-28T01:33:36.677000
CVE-2025-4939,0,1,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000
CVE-2025-4940,0,0,2476264f5ca230e398816216f503ad21bd6ee0718fc81a3cc8e1ef1268a9a775,2025-05-21T20:25:16.407000
CVE-2025-4941,0,0,82d771500a33f9b956507ffd28047b96677ad4beb2427845b21268f137b2c892,2025-05-21T20:25:16.407000
CVE-2025-4941,0,1,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000
CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000
CVE-2025-4948,0,0,dbe30938d8190315dbaa2e8d5919e8362721c3330df496b34aaab2abe9515761,2025-05-26T12:15:23.963000
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
@ -295481,12 +295481,12 @@ CVE-2025-4998,0,0,a06730a0691f90a016a49869bfa33e7c322397c4e2518cd0a37207b1507563
CVE-2025-4999,0,0,13735415b149480bfb9de9a45e935c4947f4c7ec7df58eed18894635f565eb11,2025-05-21T20:24:58.133000
CVE-2025-5000,0,0,b88fb5c3c6d713007bd8f08b5b98b94c4b65f452e1cfcae4950b23010aca8b7a,2025-05-21T20:24:58.133000
CVE-2025-5001,0,0,31ad5c5ea8790484d4eb2202eb4a0629e0128642e382cfb8927c9b9893b4fc3b,2025-05-21T20:24:58.133000
CVE-2025-5002,0,0,aa550d09179c9601bc82e597278e3339b109c2d213b463d7ead2b28dedc0c87f,2025-05-21T20:24:58.133000
CVE-2025-5003,0,0,9a44f46b154e04fe5f03f8443daf3417b6856b5aba0b0c5c35c060291d7e4b67,2025-05-21T20:24:58.133000
CVE-2025-5004,0,0,98a1e99d8b9fad0ef327b4c81df373b549ef5dd0fa093c7d9c1f1be9f199e7b0,2025-05-21T20:24:58.133000
CVE-2025-5006,0,0,729926df09abb067b82af766b59c94064c0f4dede57c63b42c7f94d4794cc929,2025-05-21T20:24:58.133000
CVE-2025-5002,0,1,971f36c284dfb1e294c2db4acf298a0f7591c6e0e260cfb633ad289f7903a4d3,2025-05-28T01:25:25.310000
CVE-2025-5003,0,1,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000
CVE-2025-5004,0,1,d7fd9b6c8114c9ac860c14fa88897684c73b2b8251dca41c12cda3a8ce9d421c,2025-05-28T01:20:50.517000
CVE-2025-5006,0,1,681cabb0d000288ea3de1bc96c248c8dc62af67d94cda924b490a24cb5ce4b87,2025-05-28T01:16:17.537000
CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000
CVE-2025-5008,0,0,895e1964dc0670383faa4bfe12d1cb725d77ab879d8cc70a1871495cd50c3e48,2025-05-21T23:15:55.200000
CVE-2025-5008,0,1,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d57,2025-05-28T01:06:49.867000
CVE-2025-5010,0,0,93497e2b48b334d59fac1bb8ca9073e5f336f986ef89ce0b89f9db876e65e870,2025-05-21T23:15:55.330000
CVE-2025-5011,0,0,d1caeeaa784d143902e41e16fc8809733bc411c4665df188f33764965bcab2ec,2025-05-21T23:15:55.447000
CVE-2025-5013,0,0,9e2206cee3d9a4da13b7d790d61a24286d0c704fc74b7b095d3cf27be2eea613,2025-05-21T23:15:55.563000
@ -295517,11 +295517,11 @@ CVE-2025-5073,0,0,baf1c84b4e2167692053943d4c0fd05e8f8f1a1d5bd906b6480eed1245a366
CVE-2025-5074,0,0,9ba68eed20e336e3555aa374d8a228cbc63c1570f254cad86d2d34a36791d8af,2025-05-23T15:55:02.040000
CVE-2025-5075,0,0,3557427c3c8420f28dd5505d5532f5e698013ee739fdf7287e91d365cc97d126,2025-05-23T15:55:02.040000
CVE-2025-5076,0,0,a265efd0a028820c9cc3f4c11b758391961dd4fc4ffcbd490a4aa72d99696687,2025-05-23T15:55:02.040000
CVE-2025-5077,0,0,cf81ddf3855e45cd147cfd7c7be25296289304b97720caf90b928027abccdf00,2025-05-23T15:55:02.040000
CVE-2025-5078,0,0,df85c537c14582ba004ffd2b6a92d72a1ced9a8d3f4c98bcb4839f6491cd7d7f,2025-05-23T15:55:02.040000
CVE-2025-5079,0,0,02d5c4d06d5b360debb658e138db50131ce3cfcaf0a34013fdc121faa9ffe241,2025-05-23T15:55:02.040000
CVE-2025-5077,0,1,5bb361381f7737ab78bfa864953c20bd9e7bf1942fef8fedd416b02808d591ef,2025-05-28T01:53:25.660000
CVE-2025-5078,0,1,57059c330cb53e9cb302cf773988b3ce2f731665e7a246772389547bf3f9a34e,2025-05-28T01:52:35.277000
CVE-2025-5079,0,1,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5cf,2025-05-28T01:50:48.303000
CVE-2025-5080,0,0,0cab754d3cfde3d6b3a70ea302e2a63cd1cd3967167bff559ff2766fb5a65083,2025-05-23T15:55:02.040000
CVE-2025-5081,0,0,ecde03903b4e0c77270ee0ba286b46b025588f611ffa017092a0d00ce3f95461,2025-05-23T15:55:02.040000
CVE-2025-5081,0,1,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000
CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000
CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000
CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000
@ -295648,7 +295648,7 @@ CVE-2025-5269,0,0,d6648849e120117658a5acbb7c16bd50f1ca75dd50023c661ee16daa0a44e5
CVE-2025-5270,0,0,195d1ef223876a1ec6a8c475b807542100c76e8f13d2a0cc3fa336118c44e511,2025-05-27T18:15:37.290000
CVE-2025-5271,0,0,c2c01f356cb96bac957222d1bd9c2ac4c9b8fcd9d264490b0acea16f5708168f,2025-05-27T18:15:37.647000
CVE-2025-5272,0,0,8ec12de90a46bb3ebdf50942dc0dc925b2afae99ec7433fea0df5b77b7608dd5,2025-05-27T15:15:36.627000
CVE-2025-5278,0,0,4e0b1b7e2263225630af8f91853ae0768e48246fd1734d5d49b2c463d552869e,2025-05-27T21:15:23.197000
CVE-2025-5278,0,1,136a37aa0f1d08163203be01cae4e756c87c8835551b97d174bd708954d4fdc8,2025-05-28T01:15:19.730000
CVE-2025-5279,0,0,4ae9b68433e92a9b98a184625269a81df7364baa91a596e5f693470b37bc9676,2025-05-27T21:15:23.370000
CVE-2025-5280,0,0,5e36bf8d4d6b58866390a6b6e33e15d4ba11afa7a6cbce31f85ca477449203fb,2025-05-27T21:15:23.580000
CVE-2025-5281,0,0,5fa8158ef4cf2e9ea1d36dc51d0f018cfaf38c242246d13b684663163c09dc0c,2025-05-27T21:15:23.717000

Can't render this file because it is too large.