From d339989637cf3291776b9020c919b1ca949b1bdd Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 17 Jun 2025 06:03:58 +0000 Subject: [PATCH] Auto-Update: 2025-06-17T06:00:19.321433+00:00 --- CVE-2025/CVE-2025-34xx/CVE-2025-3493.json | 16 +++ CVE-2025/CVE-2025-34xx/CVE-2025-3494.json | 16 +++ CVE-2025/CVE-2025-61xx/CVE-2025-6158.json | 156 ++++++++++++++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6159.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6160.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6161.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6162.json | 149 +++++++++++++++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6163.json | 149 +++++++++++++++++++++ README.md | 40 ++---- _state.csv | 56 ++++---- 10 files changed, 965 insertions(+), 52 deletions(-) create mode 100644 CVE-2025/CVE-2025-34xx/CVE-2025-3493.json create mode 100644 CVE-2025/CVE-2025-34xx/CVE-2025-3494.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6158.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6159.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6160.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6161.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6162.json create mode 100644 CVE-2025/CVE-2025-61xx/CVE-2025-6163.json diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3493.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3493.json new file mode 100644 index 00000000000..4159bdbfd40 --- /dev/null +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3493.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-3493", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-06-17T04:15:51.700", + "lastModified": "2025-06-17T04:15:51.700", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected by its CNA as it was not a security issue." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3494.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3494.json new file mode 100644 index 00000000000..d7ba05b5012 --- /dev/null +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3494.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-3494", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-06-17T04:15:54.940", + "lastModified": "2025-06-17T04:15:54.940", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected by its CNA as it was not a security issue." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6158.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6158.json new file mode 100644 index 00000000000..a5b30630500 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6158.json @@ -0,0 +1,156 @@ +{ + "id": "CVE-2025-6158", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-17T04:15:55.407", + "lastModified": "2025-06-17T04:15:55.407", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in D-Link DIR-665 1.00. This affects the function sub_AC78 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir665-dlink", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir665-dlink#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312633", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312633", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593161", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6159.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6159.json new file mode 100644 index 00000000000..67522353fb4 --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6159.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6159", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-17T04:15:56.140", + "lastModified": "2025-06-17T04:15:56.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects Hostel Management System 1.0. This vulnerability affects unknown code of the file /allocate_room.php. The manipulation of the argument search_box leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Aalok-zz/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312634", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312634", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593177", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6160.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6160.json new file mode 100644 index 00000000000..09ce08282ee --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6160.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6160", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-17T05:15:21.567", + "lastModified": "2025-06-17T05:15:21.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /user_customer_create_order.php. The manipulation of the argument user_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yitianweiming/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312635", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312635", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593216", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6161.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6161.json new file mode 100644 index 00000000000..8404025175b --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6161.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6161", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-17T05:15:21.833", + "lastModified": "2025-06-17T05:15:21.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Simple Food Ordering System 1.0. Affected is an unknown function of the file /editproduct.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kakalalaww/CVE/issues/17", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312636", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312636", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593237", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6162.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6162.json new file mode 100644 index 00000000000..be34bc14e2d --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6162.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6162", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-17T05:15:22.053", + "lastModified": "2025-06-17T05:15:22.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Lena-lyy/cve/blob/main/688/8.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Lena-lyy/cve/blob/main/688/8.md#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312637", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312637", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593600", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6163.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6163.json new file mode 100644 index 00000000000..db2bd39be9f --- /dev/null +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6163.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6163", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-17T05:15:22.267", + "lastModified": "2025-06-17T05:15:22.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK A3002RU 3.0.0-B20230809.1615 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formMultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Lena-lyy/cve/blob/main/688/9.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Lena-lyy/cve/blob/main/688/9.md#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312638", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312638", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.593601", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ed40c387dff..cbb36f0ff2e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-17T04:00:19.941889+00:00 +2025-06-17T06:00:19.321433+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-17T03:15:26.553000+00:00 +2025-06-17T05:15:22.267000+00:00 ``` ### Last Data Feed Release @@ -33,37 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -298094 +298102 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `8` -- [CVE-2024-21856](CVE-2024/CVE-2024-218xx/CVE-2024-21856.json) (`2025-06-17T03:15:23.700`) -- [CVE-2024-43422](CVE-2024/CVE-2024-434xx/CVE-2024-43422.json) (`2025-06-17T03:15:24.283`) -- [CVE-2024-45065](CVE-2024/CVE-2024-450xx/CVE-2024-45065.json) (`2025-06-17T03:15:24.353`) -- [CVE-2024-45069](CVE-2024/CVE-2024-450xx/CVE-2024-45069.json) (`2025-06-17T03:15:24.430`) -- [CVE-2024-45380](CVE-2024/CVE-2024-453xx/CVE-2024-45380.json) (`2025-06-17T03:15:24.500`) -- [CVE-2025-3774](CVE-2025/CVE-2025-37xx/CVE-2025-3774.json) (`2025-06-17T02:15:18.850`) -- [CVE-2025-4775](CVE-2025/CVE-2025-47xx/CVE-2025-4775.json) (`2025-06-17T02:15:19.867`) -- [CVE-2025-49823](CVE-2025/CVE-2025-498xx/CVE-2025-49823.json) (`2025-06-17T03:15:24.580`) -- [CVE-2025-52437](CVE-2025/CVE-2025-524xx/CVE-2025-52437.json) (`2025-06-17T03:15:25.127`) -- [CVE-2025-52438](CVE-2025/CVE-2025-524xx/CVE-2025-52438.json) (`2025-06-17T03:15:25.203`) -- [CVE-2025-52439](CVE-2025/CVE-2025-524xx/CVE-2025-52439.json) (`2025-06-17T03:15:25.280`) -- [CVE-2025-52440](CVE-2025/CVE-2025-524xx/CVE-2025-52440.json) (`2025-06-17T03:15:25.347`) -- [CVE-2025-52441](CVE-2025/CVE-2025-524xx/CVE-2025-52441.json) (`2025-06-17T03:15:25.410`) -- [CVE-2025-52442](CVE-2025/CVE-2025-524xx/CVE-2025-52442.json) (`2025-06-17T03:15:25.477`) -- [CVE-2025-52443](CVE-2025/CVE-2025-524xx/CVE-2025-52443.json) (`2025-06-17T03:15:25.547`) -- [CVE-2025-52444](CVE-2025/CVE-2025-524xx/CVE-2025-52444.json) (`2025-06-17T03:15:25.607`) -- [CVE-2025-52445](CVE-2025/CVE-2025-524xx/CVE-2025-52445.json) (`2025-06-17T03:15:25.673`) -- [CVE-2025-5673](CVE-2025/CVE-2025-56xx/CVE-2025-5673.json) (`2025-06-17T02:15:20.043`) -- [CVE-2025-6152](CVE-2025/CVE-2025-61xx/CVE-2025-6152.json) (`2025-06-17T02:15:20.213`) -- [CVE-2025-6153](CVE-2025/CVE-2025-61xx/CVE-2025-6153.json) (`2025-06-17T03:15:25.743`) -- [CVE-2025-6154](CVE-2025/CVE-2025-61xx/CVE-2025-6154.json) (`2025-06-17T03:15:25.947`) -- [CVE-2025-6155](CVE-2025/CVE-2025-61xx/CVE-2025-6155.json) (`2025-06-17T03:15:26.147`) -- [CVE-2025-6156](CVE-2025/CVE-2025-61xx/CVE-2025-6156.json) (`2025-06-17T03:15:26.340`) -- [CVE-2025-6157](CVE-2025/CVE-2025-61xx/CVE-2025-6157.json) (`2025-06-17T03:15:26.553`) +- [CVE-2025-3493](CVE-2025/CVE-2025-34xx/CVE-2025-3493.json) (`2025-06-17T04:15:51.700`) +- [CVE-2025-3494](CVE-2025/CVE-2025-34xx/CVE-2025-3494.json) (`2025-06-17T04:15:54.940`) +- [CVE-2025-6158](CVE-2025/CVE-2025-61xx/CVE-2025-6158.json) (`2025-06-17T04:15:55.407`) +- [CVE-2025-6159](CVE-2025/CVE-2025-61xx/CVE-2025-6159.json) (`2025-06-17T04:15:56.140`) +- [CVE-2025-6160](CVE-2025/CVE-2025-61xx/CVE-2025-6160.json) (`2025-06-17T05:15:21.567`) +- [CVE-2025-6161](CVE-2025/CVE-2025-61xx/CVE-2025-6161.json) (`2025-06-17T05:15:21.833`) +- [CVE-2025-6162](CVE-2025/CVE-2025-61xx/CVE-2025-6162.json) (`2025-06-17T05:15:22.053`) +- [CVE-2025-6163](CVE-2025/CVE-2025-61xx/CVE-2025-6163.json) (`2025-06-17T05:15:22.267`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 53eb1696283..6685489088e 100644 --- a/_state.csv +++ b/_state.csv @@ -251420,7 +251420,7 @@ CVE-2024-21851,0,0,357d45614df90945550287893cfbeb32cbb4c927c6c52e5c9529544fa122f CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0ada,2024-11-21T08:55:07.547000 CVE-2024-21853,0,0,8b2e94801d23bbdb5bf019b58ed4c3bebe4d5924e89f85aebf11850200583047,2024-11-15T14:00:09.720000 CVE-2024-21855,0,0,b5c9a274a6224ddacae3da8acd4d32ac5bd000acaa7f8868ebcff0034ce6f2f5,2024-12-20T17:05:24.753000 -CVE-2024-21856,1,1,f92836ce2aace6dd7a2777f2d8bed47898c2dfc2a60a577b2b4bf1a4b27907fb,2025-06-17T03:15:23.700000 +CVE-2024-21856,0,0,f92836ce2aace6dd7a2777f2d8bed47898c2dfc2a60a577b2b4bf1a4b27907fb,2025-06-17T03:15:23.700000 CVE-2024-21857,0,0,21f27586f3c19c0937ea9613c54ed803a63417bde7007defebc27244529299bf,2024-08-14T17:49:14.177000 CVE-2024-21859,0,0,863a316bec4875d2da4a53bc287fa489d63bdce1d3c559da025d91fcb906e825,2025-02-12T22:15:31.227000 CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000 @@ -268034,7 +268034,7 @@ CVE-2024-43417,0,0,a64db853aab641666e5ccd36b5774318b1b87e33ceca621611b145b74c8ae CVE-2024-43418,0,0,4070430691b02a9c3a3480d7781582dd0e8dd4d964b3db2f1a26ad5f03bae23d,2024-11-20T15:20:43.297000 CVE-2024-4342,0,0,282558c76df5bcb3009222bdb45a6cd86ea77fbc4b5b09640c455d3443a4a75b,2025-01-08T16:34:29.273000 CVE-2024-43420,0,0,66ac3a672997a4d83d291e551d88c0087b68307ccb2cf6209583b2ce1bac977c,2025-05-16T14:43:56.797000 -CVE-2024-43422,1,1,0e44dea2b1d01015aa170e70ebab93bf337e6eac9a8f93e7afc439790ed3b6a7,2025-06-17T03:15:24.283000 +CVE-2024-43422,0,0,0e44dea2b1d01015aa170e70ebab93bf337e6eac9a8f93e7afc439790ed3b6a7,2025-06-17T03:15:24.283000 CVE-2024-43423,0,0,40f724200624e0a82e27d594cb589d7e20a36a5d8a3309d35fb8ec9a9cf94ddd,2024-10-01T15:41:32.537000 CVE-2024-43424,0,0,cc0f47c54bc4c371470b3c35d0c5f93b67809f67fdaa7990da8d6cb4b234c505,2024-11-05T19:39:33.873000 CVE-2024-43425,0,0,5f296986d035650bb2f65d62720e365883ad00ea6ef201fcf9554505c579fea9,2025-05-01T16:01:21.307000 @@ -269264,11 +269264,11 @@ CVE-2024-45060,0,0,fdf3192e213f43713fe94dd4f660c140c402b48e19c6be5f44cc86908a9d0 CVE-2024-45061,0,0,05b1c7309f8ac21a996408c3f436219993810ef39c6cdbea2d2923f33822314f,2025-01-15T17:15:15.113000 CVE-2024-45063,0,0,1409a1792fb044d0180db60765e18242d949607976f55c38d4cb7d3b87690fec,2024-09-06T17:35:18.370000 CVE-2024-45064,0,0,f9743d959694386bb54450caed4c891cbc8d8760238efdc92821b602741223ec,2025-04-02T22:15:17.837000 -CVE-2024-45065,1,1,8cfe7facab3cb521245e7885392073ac9463212db0914446ddd8e735d0269172,2025-06-17T03:15:24.353000 +CVE-2024-45065,0,0,8cfe7facab3cb521245e7885392073ac9463212db0914446ddd8e735d0269172,2025-06-17T03:15:24.353000 CVE-2024-45066,0,0,d33701ba745edbfb429176564dad3e868c8fa86bb8965e021d0d157e59195ffa,2024-10-01T16:18:10.680000 CVE-2024-45067,0,0,194c9038ea8eb2ec1c0bbe8ef867bac3e1ecda9d66a0f2f9b59054cd6f54a4f5,2025-05-16T14:43:26.160000 CVE-2024-45068,0,0,c8edc7e1dd2efd4150730702fd7fc207bb2cdcb6fa3089f6d2a2ca2cb86ca5f7,2024-12-03T03:15:04.953000 -CVE-2024-45069,1,1,e17613383712b4e08930338073f6275a311ae9ba0ef3380c2e4d29a03e5f71eb,2025-06-17T03:15:24.430000 +CVE-2024-45069,0,0,e17613383712b4e08930338073f6275a311ae9ba0ef3380c2e4d29a03e5f71eb,2025-06-17T03:15:24.430000 CVE-2024-4507,0,0,0cce0099e9b56e6c38adf32141097ae968c74e9462bd520a29ad2d370b497aec,2024-11-21T09:42:58.820000 CVE-2024-45070,0,0,43e0077f9a86df49dc06e0bc270dca12765a65a9b97b06417a38e8b9e983cbe0,2025-01-07T08:15:25.457000 CVE-2024-45071,0,0,0ebd9328ae264441016b56fd159e414fac64c80926728a2280c837cee121e42d,2024-10-21T13:41:29.383000 @@ -269549,7 +269549,7 @@ CVE-2024-45372,0,0,1b07d3d9e033943fb55ce65f8c2cbc8346f497a17e61dad4e25d3ecee91e0 CVE-2024-45373,0,0,149e9090bfdbf6459cd418cf73d5e0c44a72786503d9e985f6942e8fa02cbb7f,2024-10-01T16:13:23.823000 CVE-2024-45374,0,0,86e048949631fe88804ec0296c8a5c923e85472b04bc6d0226dd7e22819500ea,2024-10-17T17:15:11.997000 CVE-2024-4538,0,0,5bd1ad90e973f76dc331cc98dd5010eac6153f7bd5c3f59bc15316bd99e49f05,2024-11-21T09:43:03.833000 -CVE-2024-45380,1,1,ef9db6c1147acfd7ca36a1f66c7676d914f987eadf2e885461fe156b9e651e30,2025-06-17T03:15:24.500000 +CVE-2024-45380,0,0,ef9db6c1147acfd7ca36a1f66c7676d914f987eadf2e885461fe156b9e651e30,2025-06-17T03:15:24.500000 CVE-2024-45382,0,0,cd17bb10b42a7a52154b8f180f6a96138cbe671bc16e0955e6b9f0951bb6f705,2024-10-16T17:43:43.917000 CVE-2024-45383,0,0,18b2a12c0247f6bd404573e4f3025c14dad6c1dfae1f9cf4c31db12712f62634,2024-11-21T09:37:42.043000 CVE-2024-45384,0,0,62ecc8324fb2b658b80d54620631778adf96f05f1a6232d392a718f0d1c7ab0d,2025-03-14T20:15:13.667000 @@ -293340,6 +293340,8 @@ CVE-2025-3487,0,0,199b8611c8e5457bd92c751e347923a2fd3e3ae8117e5e7759eec299c03e59 CVE-2025-3488,0,0,c7eefb60f78d0958cd2e23946d634228ed1d24a7964a368a35db998af9592006,2025-05-06T13:42:26.630000 CVE-2025-3489,0,0,22e5f1777a5f532464016f9071d8308171f171177cfe8600f06a4b3ff312d639,2025-04-29T20:21:05.627000 CVE-2025-3491,0,0,764070d57369c52ed17db36acb0e46c080442745adab2da0d65d4052df55b4e1,2025-04-29T13:52:10.697000 +CVE-2025-3493,1,1,710768fa82b2fdfed7afb4421abc006aa127722a5b581650774cfc22d97391a6,2025-06-17T04:15:51.700000 +CVE-2025-3494,1,1,895818aaf59db2b99c5d4035d526d1a6e1e75a9b529efd9be2a175701512ee7b,2025-06-17T04:15:54.940000 CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000 CVE-2025-3496,0,0,eeeb25234db4b5411b18647e6b883fd7c97d2c7df03da24267ee3dd146e4a70c,2025-05-12T17:32:32.760000 CVE-2025-35003,0,0,21587c625dab7683038a5bdc307498878657bea1128b3a4ea6c83622b9ed0b8f,2025-05-28T15:01:30.720000 @@ -293616,7 +293618,7 @@ CVE-2025-3769,0,0,3f7372036ea22709a172464e7fa400f2a2b90380b5ac20ab94f3bbb2664582 CVE-2025-37730,0,0,67e6e3825da3f11311501c243f4ff0e5cfb6a91fd935a3fdef62ae25a64429d2,2025-05-07T14:13:20.483000 CVE-2025-37738,0,0,ba1e253afea970e2d6cbcac0df377f410e996b34b809210266fb935a59d8f3ae,2025-05-02T13:53:20.943000 CVE-2025-37739,0,0,d93f652e6f780625188bc3e58a094ab90f62616b233dc5bfe99eda3073ee8767,2025-05-02T13:53:20.943000 -CVE-2025-3774,1,1,e0d93d0a9d8e96fe75cfba1b7b14bcffe3da93696a42634506614469955a3d95,2025-06-17T02:15:18.850000 +CVE-2025-3774,0,0,e0d93d0a9d8e96fe75cfba1b7b14bcffe3da93696a42634506614469955a3d95,2025-06-17T02:15:18.850000 CVE-2025-37740,0,0,0b79f300b6870320502d371a2fade8bcb56f910752c0b3ebc63700cb9605090c,2025-05-02T13:53:20.943000 CVE-2025-37741,0,0,543b4aa9f08295025f40ee04137497aa3664ec24c9c350910788c4e006c40f24,2025-05-02T13:53:20.943000 CVE-2025-37742,0,0,3b209bd43c4dd06057871b04ab033870e3319a2f7faa61d2056bf75e91a46342,2025-05-02T13:53:20.943000 @@ -296416,7 +296418,7 @@ CVE-2025-47737,0,0,60cb12bc89ce6f2a8fe9e7af3463c6e9c2bcca5ef96322a90d7cccb126b38 CVE-2025-4774,0,0,030f0c165972a90f2efc4aaa5ddbfe19e3d1b1c3af0f3137283b01a5858b493d,2025-06-12T16:06:39.330000 CVE-2025-47748,0,0,b90bacb2c6f839ee321be88774b4833cef222cda69ff8602ec8ddb9f1d835f3e,2025-05-30T17:15:29.117000 CVE-2025-47749,0,0,77136f5a200eae36103a9c78079b2abf4fa9dbee2a99746a355de3498002722c,2025-05-19T17:30:06.440000 -CVE-2025-4775,1,1,22271c00d71698bfbc470c322d45c4bfada88f1ef7493af60dd913d7f245faee,2025-06-17T02:15:19.867000 +CVE-2025-4775,0,0,22271c00d71698bfbc470c322d45c4bfada88f1ef7493af60dd913d7f245faee,2025-06-17T02:15:19.867000 CVE-2025-47750,0,0,1a4ff5a2f7fb0cd15d257d686f97e3b073753ad3ba8037a1d7327a6c86b11820,2025-05-19T17:31:27.667000 CVE-2025-47751,0,0,3cca051328c22c5a0fcfef5487e533d7a18847e63518d22a60f69dbcef6265de,2025-05-19T17:31:59.670000 CVE-2025-47752,0,0,c2f623c1bc3fac27711347447a519c92b9c45aac3e749ecc117d915d1101e54e,2025-05-19T17:32:22.287000 @@ -297264,7 +297266,7 @@ CVE-2025-49819,0,0,7aa65990a8586863dec28602b60bc509a93e8d9398355850f5f946a77668a CVE-2025-49820,0,0,d7fb37bdf3c3fdfcda4dd8d8b01573c4b600a96f8a0f40a4d07204fb70c71c9e,2025-06-12T03:15:26.253000 CVE-2025-49821,0,0,bb9317c9c4768a7b0a634d8319ed4d699208a76952e4829f60bbc2af06ca64a6,2025-06-12T03:15:26.313000 CVE-2025-49822,0,0,de49443b576bc1f584b5a6900459b73ba17d0494708f2396f6ea98c8b4c73b58,2025-06-12T03:15:26.380000 -CVE-2025-49823,1,1,b95732f009a3f7e54813cac9b912d073b350c6d912829a668cd726c1d72dd06a,2025-06-17T03:15:24.580000 +CVE-2025-49823,0,0,b95732f009a3f7e54813cac9b912d073b350c6d912829a668cd726c1d72dd06a,2025-06-17T03:15:24.580000 CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000 CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000 CVE-2025-4985,0,0,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000 @@ -297466,16 +297468,16 @@ CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c0 CVE-2025-5238,0,0,2ea3b090ffb1e48b08d0ca2fe3294d59ed4285a1a902a2dd2038828fbe982e10,2025-06-16T12:32:18.840000 CVE-2025-5239,0,0,6516f1b341ac369c2f899c8884ddf4fbc36f529a71c6c5c2406c9cd11f9a2a1d,2025-06-06T14:06:58.193000 CVE-2025-5242,0,0,3430448059313f76ae0f8dcef9fc481fd3cfce1823da3d8abe54d77d5e6c274d,2025-06-07T23:15:22.130000 -CVE-2025-52437,1,1,cd870f88e7d7baee6d4952151c5c20a2e5c3b45cf71189a3c9d24863935baba3,2025-06-17T03:15:25.127000 -CVE-2025-52438,1,1,dc07b107d18487152e104454077e856698a4959d7e076efd593fcccf0d4c6ee3,2025-06-17T03:15:25.203000 -CVE-2025-52439,1,1,ff7fe572dc4c48e590532c16c4a5f189431e96cb2d7181e8dc60c5045d2f8066,2025-06-17T03:15:25.280000 +CVE-2025-52437,0,0,cd870f88e7d7baee6d4952151c5c20a2e5c3b45cf71189a3c9d24863935baba3,2025-06-17T03:15:25.127000 +CVE-2025-52438,0,0,dc07b107d18487152e104454077e856698a4959d7e076efd593fcccf0d4c6ee3,2025-06-17T03:15:25.203000 +CVE-2025-52439,0,0,ff7fe572dc4c48e590532c16c4a5f189431e96cb2d7181e8dc60c5045d2f8066,2025-06-17T03:15:25.280000 CVE-2025-5244,0,0,f16a7ad73436a8b188ea427e076cb6d66c3866f0d06770cfebf2ea7a2f86cb34,2025-05-28T15:01:30.720000 -CVE-2025-52440,1,1,0125181294851e04da28d4c2e2e45b4a441dc4efa2acd5cf110977183ff1fc22,2025-06-17T03:15:25.347000 -CVE-2025-52441,1,1,96ff915f9fd080b4cc2d269d3c880f93b8cfcdf2ef1eae5b4b2274a4225a7bc5,2025-06-17T03:15:25.410000 -CVE-2025-52442,1,1,e99cbd8a64ad34f61117b49d3eae586fa43d603168c412d12298cebc3dada0f0,2025-06-17T03:15:25.477000 -CVE-2025-52443,1,1,e9adc9a61c7cce647b8d83ef85e461bc9e1ccefb348981c328550da596c2d14c,2025-06-17T03:15:25.547000 -CVE-2025-52444,1,1,93054904ad530554737df8cd7258142853cfe2090c496970f4b20356b186993c,2025-06-17T03:15:25.607000 -CVE-2025-52445,1,1,32bf5fa45c16b67da856f5d24d990c19398078dd71ca0f2526b5098284f3b5db,2025-06-17T03:15:25.673000 +CVE-2025-52440,0,0,0125181294851e04da28d4c2e2e45b4a441dc4efa2acd5cf110977183ff1fc22,2025-06-17T03:15:25.347000 +CVE-2025-52441,0,0,96ff915f9fd080b4cc2d269d3c880f93b8cfcdf2ef1eae5b4b2274a4225a7bc5,2025-06-17T03:15:25.410000 +CVE-2025-52442,0,0,e99cbd8a64ad34f61117b49d3eae586fa43d603168c412d12298cebc3dada0f0,2025-06-17T03:15:25.477000 +CVE-2025-52443,0,0,e9adc9a61c7cce647b8d83ef85e461bc9e1ccefb348981c328550da596c2d14c,2025-06-17T03:15:25.547000 +CVE-2025-52444,0,0,93054904ad530554737df8cd7258142853cfe2090c496970f4b20356b186993c,2025-06-17T03:15:25.607000 +CVE-2025-52445,0,0,32bf5fa45c16b67da856f5d24d990c19398078dd71ca0f2526b5098284f3b5db,2025-06-17T03:15:25.673000 CVE-2025-5245,0,0,76dfb770c29fdb4cddbdbfbfa1fee59cf2a7272fa687dfaa6e702792fcfc63df,2025-05-28T15:01:30.720000 CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e82,2025-05-28T20:38:00.033000 CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000 @@ -297782,7 +297784,7 @@ CVE-2025-5669,0,0,e41cf90831d0a6cf4929e129e10c87880a3b230cc5343d610b4f26d94c5ca2 CVE-2025-5670,0,0,aa088ba5a44773ff1366ed76955e38f916db102440b97c97a352678ba98d3d07,2025-06-06T19:40:14.910000 CVE-2025-5671,0,0,eb8fc745fee34a3711d29fe25f4c5db1a3010a89ad41b22fe8685e426fcf1532,2025-06-05T20:12:23.777000 CVE-2025-5672,0,0,b5f35a60b31667154d144333dd8af0cb05b469f7cf6c2dd3ee23c9b3b86a5c05,2025-06-05T20:12:23.777000 -CVE-2025-5673,1,1,8429ed3f88bec5636844b85dde5e49954e79216550be21cb50707b340002c935,2025-06-17T02:15:20.043000 +CVE-2025-5673,0,0,8429ed3f88bec5636844b85dde5e49954e79216550be21cb50707b340002c935,2025-06-17T02:15:20.043000 CVE-2025-5674,0,0,00321347327a5af2fc5c4b712466e46106633bbb0b8355ca269c6d7d191000b2,2025-06-10T19:32:07.543000 CVE-2025-5675,0,0,d79dd03500c999a297bce3fa643e7aff128a4fb8f3e3aa9fbc2dfabaffc455fd,2025-06-10T19:31:56.573000 CVE-2025-5676,0,0,1ca2c49bb4d510b5740938a869bb2d11a6220d1957dff2d9f9653e2673322f3a,2025-06-10T19:31:48.510000 @@ -298082,12 +298084,18 @@ CVE-2025-6148,0,0,ed46144a74af3d43d1d2a9db5399b5a46907773866eafc7f018973eaa9a205 CVE-2025-6149,0,0,b8c74a34caddc5aedccc5c27b3a8895bf480989637bc3bee8d371141d3bd485f,2025-06-17T01:15:22.943000 CVE-2025-6150,0,0,66cd6648bb2126787c38bf421cb766554afbe49a507a351a79d6e99c28076ceb,2025-06-17T01:15:23.130000 CVE-2025-6151,0,0,627c7a04c1ac8d52f9d55728752e65257775271fa3c167c2c5e792750dee59cd,2025-06-17T01:15:23.313000 -CVE-2025-6152,1,1,aa3ddef2fafbae4ee80d66c1a53f2da1dc0d65b7d57f398d4498b20c80fedc42,2025-06-17T02:15:20.213000 -CVE-2025-6153,1,1,9b18af700a1f541aac9efe3b9f546df8adee80cd5ddad623a543dd6443a60240,2025-06-17T03:15:25.743000 -CVE-2025-6154,1,1,62ffd39fc3a940cd0efdfe8e44c0667e93ba73cb6c6d3e0c17d7cb698c7867da,2025-06-17T03:15:25.947000 -CVE-2025-6155,1,1,dac96adcb5d333d8f59da04e36da8a65c1e8e36c50dad572a02e404405e5cef7,2025-06-17T03:15:26.147000 -CVE-2025-6156,1,1,bb5aec9a2a92c168d5b89a6e1faab8a0f0630c52ea0ba035d397ceaa4a6f1cb4,2025-06-17T03:15:26.340000 -CVE-2025-6157,1,1,067a6b0195d0f495e5d4dcf8c2c8af1cdf5fa9db4869b66a6aa654600028c462,2025-06-17T03:15:26.553000 +CVE-2025-6152,0,0,aa3ddef2fafbae4ee80d66c1a53f2da1dc0d65b7d57f398d4498b20c80fedc42,2025-06-17T02:15:20.213000 +CVE-2025-6153,0,0,9b18af700a1f541aac9efe3b9f546df8adee80cd5ddad623a543dd6443a60240,2025-06-17T03:15:25.743000 +CVE-2025-6154,0,0,62ffd39fc3a940cd0efdfe8e44c0667e93ba73cb6c6d3e0c17d7cb698c7867da,2025-06-17T03:15:25.947000 +CVE-2025-6155,0,0,dac96adcb5d333d8f59da04e36da8a65c1e8e36c50dad572a02e404405e5cef7,2025-06-17T03:15:26.147000 +CVE-2025-6156,0,0,bb5aec9a2a92c168d5b89a6e1faab8a0f0630c52ea0ba035d397ceaa4a6f1cb4,2025-06-17T03:15:26.340000 +CVE-2025-6157,0,0,067a6b0195d0f495e5d4dcf8c2c8af1cdf5fa9db4869b66a6aa654600028c462,2025-06-17T03:15:26.553000 +CVE-2025-6158,1,1,e70a9d00d1c5d5f2f54842ad1d13343c991e94a307fa6041d605b53054ee66c0,2025-06-17T04:15:55.407000 +CVE-2025-6159,1,1,9124bf643ab14a535722cec372e19d57629eb2ad7fc34ca34557850ce43c5ff5,2025-06-17T04:15:56.140000 +CVE-2025-6160,1,1,b5a005f0cb3af7af3cbd83f95c58b0de1833f0c1a8794260093b19e9d4e1542f,2025-06-17T05:15:21.567000 +CVE-2025-6161,1,1,04ef0d4ea23661165f29c62c6f3f4f4ce80da3c1c05907386de341f49b851245,2025-06-17T05:15:21.833000 +CVE-2025-6162,1,1,af3afed5c97f174bc1ec87fa874c16055bff42df943207923f306c6d9965be16,2025-06-17T05:15:22.053000 +CVE-2025-6163,1,1,7bc2b2f48c2420316b423e722c94da079d7d1613e6a363e835137d32165dbd9d,2025-06-17T05:15:22.267000 CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000 CVE-2025-6170,0,0,b6c9e594edbf46197f9f9a30d565b603f055d40c252eab039c7ec60bb43a9554,2025-06-16T16:15:20.430000 CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000