From d810cf7b503bac82fe10595dc076c983917e2a5d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 10 Jun 2025 16:03:58 +0000 Subject: [PATCH] Auto-Update: 2025-06-10T16:00:23.374176+00:00 --- CVE-2013/CVE-2013-69xx/CVE-2013-6954.json | 66 +++- CVE-2021/CVE-2021-252xx/CVE-2021-25254.json | 49 ++- CVE-2021/CVE-2021-252xx/CVE-2021-25255.json | 49 ++- CVE-2021/CVE-2021-252xx/CVE-2021-25262.json | 61 +++- CVE-2022/CVE-2022-09xx/CVE-2022-0934.json | 24 +- CVE-2022/CVE-2022-397xx/CVE-2022-39799.json | 24 +- CVE-2022/CVE-2022-398xx/CVE-2022-39801.json | 24 +- CVE-2022/CVE-2022-463xx/CVE-2022-46337.json | 32 +- CVE-2023/CVE-2023-388xx/CVE-2023-38823.json | 32 +- CVE-2023/CVE-2023-453xx/CVE-2023-45377.json | 32 +- CVE-2023/CVE-2023-464xx/CVE-2023-46471.json | 32 +- CVE-2023/CVE-2023-55xx/CVE-2023-5553.json | 12 +- CVE-2024/CVE-2024-09xx/CVE-2024-0974.json | 46 ++- CVE-2024/CVE-2024-222xx/CVE-2024-22259.json | 81 ++++- CVE-2024/CVE-2024-241xx/CVE-2024-24110.json | 36 +- CVE-2024/CVE-2024-282xx/CVE-2024-28283.json | 46 ++- CVE-2024/CVE-2024-291xx/CVE-2024-29198.json | 64 ++++ CVE-2024/CVE-2024-309xx/CVE-2024-30950.json | 31 +- CVE-2024/CVE-2024-309xx/CVE-2024-30951.json | 31 +- CVE-2024/CVE-2024-30xx/CVE-2024-3076.json | 46 ++- CVE-2024/CVE-2024-336xx/CVE-2024-33672.json | 52 ++- CVE-2024/CVE-2024-347xx/CVE-2024-34711.json | 68 ++++ CVE-2024/CVE-2024-385xx/CVE-2024-38524.json | 72 ++++ CVE-2024/CVE-2024-406xx/CVE-2024-40625.json | 64 ++++ CVE-2025/CVE-2025-224xx/CVE-2025-22455.json | 56 +++ CVE-2025/CVE-2025-224xx/CVE-2025-22463.json | 56 +++ CVE-2025/CVE-2025-263xx/CVE-2025-26394.json | 60 ++++ CVE-2025/CVE-2025-263xx/CVE-2025-26395.json | 60 ++++ CVE-2025/CVE-2025-275xx/CVE-2025-27505.json | 68 ++++ CVE-2025/CVE-2025-301xx/CVE-2025-30145.json | 64 ++++ CVE-2025/CVE-2025-311xx/CVE-2025-31134.json | 71 +++- CVE-2025/CVE-2025-311xx/CVE-2025-31136.json | 59 +++- CVE-2025/CVE-2025-317xx/CVE-2025-31710.json | 123 ++++++- CVE-2025/CVE-2025-317xx/CVE-2025-31711.json | 148 +++++++- CVE-2025/CVE-2025-317xx/CVE-2025-31712.json | 148 +++++++- CVE-2025/CVE-2025-371xx/CVE-2025-37100.json | 44 +++ CVE-2025/CVE-2025-461xx/CVE-2025-46173.json | 32 +- CVE-2025/CVE-2025-462xx/CVE-2025-46203.json | 32 +- CVE-2025/CVE-2025-462xx/CVE-2025-46204.json | 32 +- CVE-2025/CVE-2025-466xx/CVE-2025-46612.json | 56 +++ CVE-2025/CVE-2025-477xx/CVE-2025-47702.json | 27 +- CVE-2025/CVE-2025-477xx/CVE-2025-47703.json | 27 +- CVE-2025/CVE-2025-477xx/CVE-2025-47704.json | 34 +- CVE-2025/CVE-2025-477xx/CVE-2025-47705.json | 34 +- CVE-2025/CVE-2025-477xx/CVE-2025-47706.json | 35 +- CVE-2025/CVE-2025-477xx/CVE-2025-47707.json | 35 +- CVE-2025/CVE-2025-477xx/CVE-2025-47708.json | 35 +- CVE-2025/CVE-2025-477xx/CVE-2025-47709.json | 35 +- CVE-2025/CVE-2025-477xx/CVE-2025-47710.json | 35 +- CVE-2025/CVE-2025-478xx/CVE-2025-47827.json | 43 ++- CVE-2025/CVE-2025-480xx/CVE-2025-48009.json | 27 +- CVE-2025/CVE-2025-480xx/CVE-2025-48010.json | 28 +- CVE-2025/CVE-2025-480xx/CVE-2025-48011.json | 29 +- CVE-2025/CVE-2025-480xx/CVE-2025-48012.json | 28 +- CVE-2025/CVE-2025-484xx/CVE-2025-48471.json | 61 +++- CVE-2025/CVE-2025-484xx/CVE-2025-48472.json | 61 +++- CVE-2025/CVE-2025-491xx/CVE-2025-49136.json | 12 +- CVE-2025/CVE-2025-52xx/CVE-2025-5226.json | 53 ++- CVE-2025/CVE-2025-52xx/CVE-2025-5227.json | 53 ++- CVE-2025/CVE-2025-52xx/CVE-2025-5230.json | 73 +++- CVE-2025/CVE-2025-52xx/CVE-2025-5231.json | 73 +++- CVE-2025/CVE-2025-52xx/CVE-2025-5232.json | 73 +++- CVE-2025/CVE-2025-52xx/CVE-2025-5248.json | 73 +++- CVE-2025/CVE-2025-52xx/CVE-2025-5250.json | 73 +++- CVE-2025/CVE-2025-52xx/CVE-2025-5251.json | 73 +++- CVE-2025/CVE-2025-52xx/CVE-2025-5299.json | 51 ++- CVE-2025/CVE-2025-53xx/CVE-2025-5327.json | 84 ++++- CVE-2025/CVE-2025-53xx/CVE-2025-5328.json | 82 ++++- CVE-2025/CVE-2025-53xx/CVE-2025-5335.json | 56 +++ CVE-2025/CVE-2025-53xx/CVE-2025-5353.json | 56 +++ CVE-2025/CVE-2025-53xx/CVE-2025-5358.json | 68 +++- CVE-2025/CVE-2025-53xx/CVE-2025-5359.json | 73 +++- CVE-2025/CVE-2025-54xx/CVE-2025-5443.json | 232 ++++++++++++- CVE-2025/CVE-2025-54xx/CVE-2025-5444.json | 232 ++++++++++++- CVE-2025/CVE-2025-54xx/CVE-2025-5445.json | 232 ++++++++++++- CVE-2025/CVE-2025-55xx/CVE-2025-5546.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5553.json | 83 ++++- CVE-2025/CVE-2025-55xx/CVE-2025-5554.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5556.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5557.json | 83 ++++- CVE-2025/CVE-2025-55xx/CVE-2025-5558.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5560.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5561.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5562.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5566.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5574.json | 73 +++- CVE-2025/CVE-2025-55xx/CVE-2025-5584.json | 72 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5600.json | 77 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5602.json | 72 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5603.json | 72 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5604.json | 72 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5606.json | 97 +++++- CVE-2025/CVE-2025-56xx/CVE-2025-5614.json | 72 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5615.json | 72 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5631.json | 87 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5632.json | 87 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5633.json | 87 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5649.json | 86 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5650.json | 82 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5651.json | 87 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5653.json | 73 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5654.json | 73 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5655.json | 73 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5656.json | 73 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5657.json | 73 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5658.json | 73 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5661.json | 87 ++++- CVE-2025/CVE-2025-56xx/CVE-2025-5685.json | 97 +++++- CVE-2025/CVE-2025-56xx/CVE-2025-5693.json | 73 +++- CVE-2025/CVE-2025-56xx/CVE-2025-5694.json | 73 +++- CVE-2025/CVE-2025-57xx/CVE-2025-5704.json | 55 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5705.json | 55 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5706.json | 88 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5707.json | 88 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5708.json | 60 +++- CVE-2025/CVE-2025-57xx/CVE-2025-5709.json | 55 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5710.json | 55 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5711.json | 65 +++- CVE-2025/CVE-2025-57xx/CVE-2025-5712.json | 58 +++- CVE-2025/CVE-2025-57xx/CVE-2025-5716.json | 58 +++- CVE-2025/CVE-2025-57xx/CVE-2025-5721.json | 82 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5722.json | 87 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5723.json | 87 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5724.json | 87 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5725.json | 88 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5728.json | 89 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5732.json | 85 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5755.json | 57 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5758.json | 57 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5759.json | 77 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5761.json | 77 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5762.json | 85 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5763.json | 103 +++++- CVE-2025/CVE-2025-57xx/CVE-2025-5782.json | 52 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5783.json | 57 ++- CVE-2025/CVE-2025-57xx/CVE-2025-5784.json | 73 +++- CVE-2025/CVE-2025-57xx/CVE-2025-5785.json | 82 ++++- CVE-2025/CVE-2025-57xx/CVE-2025-5786.json | 82 ++++- CVE-2025/CVE-2025-58xx/CVE-2025-5838.json | 73 +++- CVE-2025/CVE-2025-58xx/CVE-2025-5840.json | 51 ++- CVE-2025/CVE-2025-58xx/CVE-2025-5856.json | 76 +++- CVE-2025/CVE-2025-58xx/CVE-2025-5858.json | 77 ++++- CVE-2025/CVE-2025-58xx/CVE-2025-5886.json | 14 +- CVE-2025/CVE-2025-59xx/CVE-2025-5911.json | 14 +- README.md | 86 ++--- _state.csv | 362 ++++++++++---------- 146 files changed, 8956 insertions(+), 1033 deletions(-) create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29198.json create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34711.json create mode 100644 CVE-2024/CVE-2024-385xx/CVE-2024-38524.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40625.json create mode 100644 CVE-2025/CVE-2025-224xx/CVE-2025-22455.json create mode 100644 CVE-2025/CVE-2025-224xx/CVE-2025-22463.json create mode 100644 CVE-2025/CVE-2025-263xx/CVE-2025-26394.json create mode 100644 CVE-2025/CVE-2025-263xx/CVE-2025-26395.json create mode 100644 CVE-2025/CVE-2025-275xx/CVE-2025-27505.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30145.json create mode 100644 CVE-2025/CVE-2025-371xx/CVE-2025-37100.json create mode 100644 CVE-2025/CVE-2025-466xx/CVE-2025-46612.json create mode 100644 CVE-2025/CVE-2025-53xx/CVE-2025-5335.json create mode 100644 CVE-2025/CVE-2025-53xx/CVE-2025-5353.json diff --git a/CVE-2013/CVE-2013-69xx/CVE-2013-6954.json b/CVE-2013/CVE-2013-69xx/CVE-2013-6954.json index 9ab73728322..e3b35272ee8 100644 --- a/CVE-2013/CVE-2013-69xx/CVE-2013-6954.json +++ b/CVE-2013/CVE-2013-69xx/CVE-2013-6954.json @@ -2,7 +2,7 @@ "id": "CVE-2013-6954", "sourceIdentifier": "cret@cert.org", "published": "2014-01-12T18:34:55.893", - "lastModified": "2025-04-11T00:51:21.963", + "lastModified": "2025-06-10T14:15:22.367", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,6 +74,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ @@ -179,6 +211,22 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "cret@cert.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "cret@cert.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "cret@cert.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "cret@cert.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "cret@cert.org" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "cret@cert.org" @@ -297,6 +345,22 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2021/CVE-2021-252xx/CVE-2021-25254.json b/CVE-2021/CVE-2021-252xx/CVE-2021-25254.json index 063639aa5c1..596e9a07a28 100644 --- a/CVE-2021/CVE-2021-252xx/CVE-2021-25254.json +++ b/CVE-2021/CVE-2021-252xx/CVE-2021-25254.json @@ -2,8 +2,8 @@ "id": "CVE-2021-25254", "sourceIdentifier": "browser-security@yandex-team.ru", "published": "2025-05-21T07:15:59.357", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:51:27.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:lite:android:*:*", + "versionEndExcluding": "21.1.0", + "matchCriteriaId": "95A0B10D-4D67-429C-8985-DD8713E555F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", - "source": "browser-security@yandex-team.ru" + "source": "browser-security@yandex-team.ru", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-252xx/CVE-2021-25255.json b/CVE-2021/CVE-2021-252xx/CVE-2021-25255.json index 0c6f4e9cf05..895c4b1aebe 100644 --- a/CVE-2021/CVE-2021-252xx/CVE-2021-25255.json +++ b/CVE-2021/CVE-2021-252xx/CVE-2021-25255.json @@ -2,8 +2,8 @@ "id": "CVE-2021-25255", "sourceIdentifier": "browser-security@yandex-team.ru", "published": "2025-05-21T07:16:00.500", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:50:05.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:lite:android:*:*", + "versionEndExcluding": "21.1.0", + "matchCriteriaId": "95A0B10D-4D67-429C-8985-DD8713E555F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", - "source": "browser-security@yandex-team.ru" + "source": "browser-security@yandex-team.ru", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-252xx/CVE-2021-25262.json b/CVE-2021/CVE-2021-252xx/CVE-2021-25262.json index 42254f3667e..cf77eef0769 100644 --- a/CVE-2021/CVE-2021-252xx/CVE-2021-25262.json +++ b/CVE-2021/CVE-2021-252xx/CVE-2021-25262.json @@ -2,8 +2,8 @@ "id": "CVE-2021-25262", "sourceIdentifier": "browser-security@yandex-team.ru", "published": "2025-05-21T07:16:00.653", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:49:44.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } ] }, "weaknesses": [ @@ -73,10 +95,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yandex:yandex_browser:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.3.0", + "matchCriteriaId": "0135C6B0-3140-4C01-B6E6-BFE83F2FF008" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://yandex.com/bugbounty/i/hall-of-fame-browser/", - "source": "browser-security@yandex-team.ru" + "source": "browser-security@yandex-team.ru", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-09xx/CVE-2022-0934.json b/CVE-2022/CVE-2022-09xx/CVE-2022-0934.json index 4ad184b5dd3..46c1b2948c3 100644 --- a/CVE-2022/CVE-2022-09xx/CVE-2022-0934.json +++ b/CVE-2022/CVE-2022-09xx/CVE-2022-0934.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0934", "sourceIdentifier": "secalert@redhat.com", "published": "2022-08-29T15:15:10.087", - "lastModified": "2024-11-21T06:39:41.650", + "lastModified": "2025-06-10T14:15:23.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-397xx/CVE-2022-39799.json b/CVE-2022/CVE-2022-397xx/CVE-2022-39799.json index 0b9fbdcf870..aeb9a4beffc 100644 --- a/CVE-2022/CVE-2022-397xx/CVE-2022-39799.json +++ b/CVE-2022/CVE-2022-397xx/CVE-2022-39799.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39799", "sourceIdentifier": "cna@sap.com", "published": "2022-09-13T16:15:09.110", - "lastModified": "2024-11-21T07:18:16.317", + "lastModified": "2025-06-10T14:15:24.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "cna@sap.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39801.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39801.json index 806fd64ed9b..7ded268b0e1 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39801.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39801.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39801", "sourceIdentifier": "cna@sap.com", "published": "2022-09-13T16:15:09.170", - "lastModified": "2024-11-21T07:18:16.603", + "lastModified": "2025-06-10T14:15:24.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "cna@sap.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46337.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46337.json index d52869c61d7..c2a8c905759 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46337.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46337.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46337", "sourceIdentifier": "security@apache.org", "published": "2023-11-20T09:15:07.180", - "lastModified": "2024-11-21T07:30:24.783", + "lastModified": "2025-06-10T14:15:24.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38823.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38823.json index 3bc95fd30ca..a143f70a353 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38823.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38823.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38823", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-20T20:15:07.357", - "lastModified": "2024-11-21T08:14:13.427", + "lastModified": "2025-06-10T14:15:25.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45377.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45377.json index 8070d2840c1..88a9743f32f 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45377.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45377.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45377", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-22T17:15:22.083", - "lastModified": "2024-11-21T08:26:51.197", + "lastModified": "2025-06-10T14:15:25.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46471.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46471.json index 4409f62b44c..fa5dda0b656 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46471.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46471.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46471", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-20T21:15:08.253", - "lastModified": "2024-11-21T08:28:33.670", + "lastModified": "2025-06-10T14:15:26.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5553.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5553.json index bdb258e0062..d4abee5b82e 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5553.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5553.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5553", "sourceIdentifier": "product-security@axis.com", "published": "2023-11-21T07:15:11.180", - "lastModified": "2024-11-21T08:42:00.047", + "lastModified": "2025-06-10T14:15:26.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,16 +79,6 @@ "value": "NVD-CWE-noinfo" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-693" - } - ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0974.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0974.json index 1a59e198935..c82ecce7be1 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0974.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0974", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-12T06:15:01.977", - "lastModified": "2024-11-21T08:47:55.893", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:54:40.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmwebproperties:social_media_widget:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.9", + "matchCriteriaId": "93730C5A-503D-44FF-8CA8-92463B0EC8A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/7f8e5e63-a928-443e-9771-8b3f51f5eb9e/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/7f8e5e63-a928-443e-9771-8b3f51f5eb9e/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json index a11bcdea37a..79b215702ae 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22259", "sourceIdentifier": "security@vmware.com", "published": "2024-03-16T05:15:20.830", - "lastModified": "2025-02-13T18:16:47.843", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:55:48.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,91 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.3.33", + "matchCriteriaId": "265CE42F-68C0-46AD-80E8-382D052833E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.0.18", + "matchCriteriaId": "1C1F744C-2328-45FA-BA6F-EAC3AA1E4FC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.0", + "versionEndExcluding": "6.1.5", + "matchCriteriaId": "D4C4F614-8E7A-4FFE-BC70-1728739E8E3C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", + "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", + "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240524-0002/", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://spring.io/security/cve-2024-22259", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240524-0002/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://spring.io/security/cve-2024-22259", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24110.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24110.json index 76fe6589ad4..6c5d279b220 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24110.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24110.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24110", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:09.993", - "lastModified": "2024-11-21T08:58:55.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:50:19.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crmeb:crmeb_java:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.4", + "matchCriteriaId": "7B87506E-26F7-4CA1-A01B-16898322A42D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/crmeb/crmeb_java/issues/13", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/crmeb/crmeb_java/issues/13", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28283.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28283.json index 63825881254..6eb5bb4efc0 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28283.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28283.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28283", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T21:15:07.770", - "lastModified": "2024-11-21T09:06:08.270", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:52:54.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e1000_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.1.03", + "matchCriteriaId": "D9C5B5F7-101B-4345-BE1B-D87DF4DCB979" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B409A457-E325-4C4F-9339-24753EA1D72F" + } + ] + } + ] + } + ], "references": [ { "url": "https://d05004.notion.site/Linksys-E1000-BOF-37b98eec45ea4fc991b9b5bea3db091d?pvs=4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://d05004.notion.site/Linksys-E1000-BOF-37b98eec45ea4fc991b9b5bea3db091d?pvs=4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29198.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29198.json new file mode 100644 index 00000000000..5b9dc93e040 --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29198.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-29198", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T15:15:22.140", + "lastModified": "2025-06-10T15:15:22.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. It possible to achieve Service Side Request Forgery (SSRF) via the Demo request endpoint if Proxy Base URL has not been set. Upgrading to GeoServer 2.24.4, or 2.25.2, removes the TestWfsPost servlet resolving this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-5gw5-jccf-6hxw", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOS-11390", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOS-11794", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json index ed0e896614f..05b1741402a 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30950.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30950", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T19:15:07.420", - "lastModified": "2024-11-21T09:12:37.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:35:56.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fudforum:fudforum:3.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "442E1EDD-6C83-4806-9ABD-4A41A3486900" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/stored_xss_in_admsql.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/stored_xss_in_admsql.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json index 54bdd4117d8..1345b61b931 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30951.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30951", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T18:15:15.947", - "lastModified": "2024-11-22T16:15:21.960", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:37:30.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fudforum:fudforum:3.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "442E1EDD-6C83-4806-9ABD-4A41A3486900" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/Reflected_xss_in_FUDforum.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/Reflected_xss_in_FUDforum.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3076.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3076.json index b646a4e59f1..c896c98fe8c 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3076.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3076", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T14:15:07.370", - "lastModified": "2024-11-21T09:28:50.613", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:05:59.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mmilan81:mm-email2image:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.2.5", + "matchCriteriaId": "F850D534-0620-4073-B5C7-B2FCF40B3FE8" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33672.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33672.json index ac1e497929b..e275a6ec2a5 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33672.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33672.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33672", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T02:15:06.607", - "lastModified": "2024-11-21T09:17:22.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:32:30.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veritas:netbackup:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4", + "matchCriteriaId": "CD4A9EB3-095C-4E82-96E2-85031A2C80B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veritas.com/support/en_US/security/VTS24-001", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.veritas.com/support/en_US/security/VTS24-001", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34711.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34711.json new file mode 100644 index 00000000000..05ac12ccc08 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34711.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-34711", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T15:15:22.710", + "lastModified": "2025-06-10T15:15:22.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. An improper URI validation vulnerability exists that enables an unauthorized attacker to perform XML External Entities (XEE) attack, then send GET request to any HTTP server. By default, GeoServer use PreventLocalEntityResolver class from GeoTools to filter out malicious URIs in XML entities before resolving them. The URI must match the regex (?i)(jar:file|http|vfs)[^?#;]*\\\\.xsd. But the regex leaves a chance for attackers to request to any HTTP server or limited file. Attacker can abuse this to scan internal networks and gain information about them then exploit further. GeoServer 2.25.0 and greater default to the use of ENTITY_RESOLUTION_ALLOWLIST and does not require you to provide a system property." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-611" + }, + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://docs.geoserver.org/latest/en/user/production/config.html#production-config-external-entities", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-mc43-4fqr-c965", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38524.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38524.json new file mode 100644 index 00000000000..bec10e2dcbd --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38524.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-38524", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T15:15:22.880", + "lastModified": "2025-06-10T15:15:22.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. org.geowebcache.GeoWebCacheDispatcher.handleFrontPage(HttpServletRequest, HttpServletResponse) has no check to hide potentially sensitive information from users except for a hidden system property to hide the storage locations that defaults to showing the locations. This vulnerability is fixed in 2.26.2 and 2.25.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/GeoWebCache/geowebcache/issues/1344", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/GeoWebCache/geowebcache/pull/1345", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/pull/8189", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-jm79-7xhw-6f6f", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOS-11677", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40625.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40625.json new file mode 100644 index 00000000000..dbd717ab542 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40625.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-40625", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T15:15:23.043", + "lastModified": "2025-06-10T15:15:23.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. The Coverage rest api /workspaces/{workspaceName}/coveragestores/{storeName}/{method}.{format} allows attackers to upload files with a specified url (with {method} equals 'url') with no restrict. This vulnerability is fixed in 2.26.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-r4hf-r8gj-jgw2", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOS-11468", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOS-11717", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22455.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22455.json new file mode 100644 index 00000000000..89f66f4bff6 --- /dev/null +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22455.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22455", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2025-06-10T15:15:23.210", + "lastModified": "2025-06-10T15:15:23.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a local authenticated attacker to decrypt stored SQL credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-CVE-2025-5353-CVE-CVE-2025-22463-CVE-2025-22455", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22463.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22463.json new file mode 100644 index 00000000000..eac50924689 --- /dev/null +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22463.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22463", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2025-06-10T15:15:23.383", + "lastModified": "2025-06-10T15:15:23.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt the stored environment password." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-CVE-2025-5353-CVE-CVE-2025-22463-CVE-2025-22455", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26394.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26394.json new file mode 100644 index 00000000000..6d017345d17 --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26394.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26394", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2025-06-10T15:15:23.543", + "lastModified": "2025-06-10T15:15:23.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SolarWinds Observability Self-Hosted\n\n is susceptible to an open redirection vulnerability. The URL is not properly sanitized, and an attacker could manipulate the string to redirect a user to a malicious site. The attack complexity is high, and authentication is required." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/hco_2025-2_release_notes.htm", + "source": "psirt@solarwinds.com" + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26394", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26395.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26395.json new file mode 100644 index 00000000000..892697ec854 --- /dev/null +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26395.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26395", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2025-06-10T15:15:23.723", + "lastModified": "2025-06-10T15:15:23.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SolarWinds Observability Self-Hosted\n\n was susceptible to a cross-site scripting (XSS) vulnerability due to an unsanitized field in the URL. The attack requires authentication using an administrator-level account and user interaction is required." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/hco_2025-2_release_notes.htm", + "source": "psirt@solarwinds.com" + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26395", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27505.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27505.json new file mode 100644 index 00000000000..4c0dd7e1e4d --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27505.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-27505", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T15:15:23.903", + "lastModified": "2025-06-10T15:15:23.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. It is possible to bypass the default REST API security and access the index page. The REST API security handles rest and its subpaths but not rest with an extension (e.g., rest.html). The REST API index can disclose whether certain extensions are installed. This vulnerability is fixed in 2.26.3 and 2.25.6. As a workaround, in ${GEOSERVER_DATA_DIR}/security/config.xml, change the paths for the rest filter to /rest.*,/rest/** and change the paths for the gwc filter to /gwc/rest.*,/gwc/rest/** and restart GeoServer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geoserver/geoserver/pull/8170", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-h86g-x8mm-78m5", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOS-11664", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOS-11776", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30145.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30145.json new file mode 100644 index 00000000000..92b789749bc --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30145.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-30145", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-06-10T15:15:24.070", + "lastModified": "2025-06-10T15:15:24.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Malicious Jiffle scripts can be executed by GeoServer, either as a rendering transformation in WMS dynamic styles or as a WPS process, that can enter an infinite loop to trigger denial of service. This vulnerability is fixed in 2.27.0, 2.26.3, and 2.25.7. This vulnerability can be mitigated by disabling WMS dynamic styling and the Jiffle process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-gr67-pwcv-76gf", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geosolutions-it/jai-ext/pull/307", + "source": "security-advisories@github.com" + }, + { + "url": "https://osgeo-org.atlassian.net/browse/GEOS-11778", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31134.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31134.json index 5aa20abe700..0852ed7fd55 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31134.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31134.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31134", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-04T20:15:22.657", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:08:24.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,20 +93,59 @@ "value": "CWE-201" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.26.2", + "matchCriteriaId": "5750A689-0869-499D-8A26-E5088B31DDF4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/FreshRSS/FreshRSS/commit/4568111c00813756a3a34a381d684b8354fc4438", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-jjm2-4hf7-9x65", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-jjm2-4hf7-9x65", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31136.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31136.json index 56cd1db5b3b..4c538d35f3d 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31136.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31136.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31136", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-04T20:15:22.843", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:08:13.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,18 +71,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.26.2", + "matchCriteriaId": "5750A689-0869-499D-8A26-E5088B31DDF4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FreshRSS/FreshRSS/commit/426e3054c237c2b98667ebeacbbdb5caa88e7b1f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-f6r4-jrvc-cfmr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-f6r4-jrvc-cfmr", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31710.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31710.json index a9bfe78a6f5..4073c175aa4 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31710.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31710.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31710", "sourceIdentifier": "security@unisoc.com", "published": "2025-06-03T06:15:27.310", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:15:23.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, @@ -51,10 +71,107 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B37CC5BC-D87D-497A-B8A1-38718AB4F116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFCCDED4-7E32-48CB-909D-06001C35E745" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t8300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC7743D5-B187-48D4-BC77-D8DCDF263166" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t9300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "027BA3F8-B2E3-4D71-977D-E86E8D539269" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31711.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31711.json index 62bb15543ab..05f9283fd3f 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31711.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31711.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31711", "sourceIdentifier": "security@unisoc.com", "published": "2025-06-03T06:15:27.480", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:15:41.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -51,10 +71,132 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B37CC5BC-D87D-497A-B8A1-38718AB4F116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFCCDED4-7E32-48CB-909D-06001C35E745" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t8300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC7743D5-B187-48D4-BC77-D8DCDF263166" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t9300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "027BA3F8-B2E3-4D71-977D-E86E8D539269" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-317xx/CVE-2025-31712.json b/CVE-2025/CVE-2025-317xx/CVE-2025-31712.json index 1cdebcaff02..b1e453b777f 100644 --- a/CVE-2025/CVE-2025-317xx/CVE-2025-31712.json +++ b/CVE-2025/CVE-2025-317xx/CVE-2025-31712.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31712", "sourceIdentifier": "security@unisoc.com", "published": "2025-06-03T06:15:27.613", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:15:48.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -51,10 +71,132 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B37CC5BC-D87D-497A-B8A1-38718AB4F116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFCCDED4-7E32-48CB-909D-06001C35E745" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t8300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC7743D5-B187-48D4-BC77-D8DCDF263166" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t9300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "027BA3F8-B2E3-4D71-977D-E86E8D539269" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-371xx/CVE-2025-37100.json b/CVE-2025/CVE-2025-371xx/CVE-2025-37100.json new file mode 100644 index 00000000000..55438531d7d --- /dev/null +++ b/CVE-2025/CVE-2025-371xx/CVE-2025-37100.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-37100", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-06-10T15:15:24.233", + "lastModified": "2025-06-10T15:15:24.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the APIs of HPE Aruba Networking Private 5G Core\u00a0could potentially expose sensitive information to unauthorized users. \nA successful exploitation could allow an attacker to iteratively navigate through the filesystem and ultimately download protected system files containing sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04883en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-461xx/CVE-2025-46173.json b/CVE-2025/CVE-2025-461xx/CVE-2025-46173.json index ba175a2d040..9d13e134e12 100644 --- a/CVE-2025/CVE-2025-461xx/CVE-2025-46173.json +++ b/CVE-2025/CVE-2025-461xx/CVE-2025-46173.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46173", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-27T20:15:24.660", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:12:53.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_exam_mastering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C565C4E4-4E2E-4427-BEEB-7E34617B604F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pruthuraut/CVE-2025-46173", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.invicti.com/learn/blind-cross-site-scripting/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46203.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46203.json index 5ecda0175d2..e4864b2236a 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46203.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46203.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46203", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-04T20:15:23.473", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:07:28.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:changeweb:unifiedtransform:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "883EFC82-98B6-4094-8472-3A520B2F0196" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/changeweb/Unifiedtransform", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/spbavarva/CVE-2025-46203", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46204.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46204.json index 2cc435636a0..60054eae02a 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46204.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46204.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46204", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-04T20:15:23.647", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:07:19.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:changeweb:unifiedtransform:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "883EFC82-98B6-4094-8472-3A520B2F0196" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/changeweb/Unifiedtransform", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/spbavarva/CVE-2025-46204", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46612.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46612.json new file mode 100644 index 00000000000..2949139d54b --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46612.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46612", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-10T15:15:25.027", + "lastModified": "2025-06-10T15:15:25.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Panel Designer dashboard in Airleader Master and Easy before 6.36 allows remote attackers to execute arbitrary commands via a wizard/workspace.jsp unrestricted file upload. To exploit this, the attacker must login to the administrator console (default credentials are weak and easily guessable) and upload a JSP file via the Panel Designer dashboard." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-036.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47702.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47702.json index 8587e40dbdc..670c8be33dd 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47702.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47702.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47702", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:49.397", - "lastModified": "2025-05-16T14:43:56.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:40:02.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oembed_providers_project:oembed_providers:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "2.2.2", + "matchCriteriaId": "C89BC925-844D-44FA-AB32-826CA3A46126" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-048", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47703.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47703.json index 02e7e7034ca..b866c214a52 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47703.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47703.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47703", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:49.503", - "lastModified": "2025-05-20T17:15:49.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:39:25.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cookies_consent_manager_project:cookies_coonsent_manager:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "1.2.14", + "matchCriteriaId": "DB3E22E3-BCA3-49B8-86C3-231A6666D910" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-049", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47704.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47704.json index 66b386e1ec2..4785915bbaa 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47704.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47704.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47704", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:49.613", - "lastModified": "2025-05-20T17:15:49.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:32:53.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:klaro_cookie_\\&_consent_management_project:klaro_cookie_\\&_consent_management:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "3.0.5", + "matchCriteriaId": "AA9B19FA-829E-4A84-B927-4B2AAB28A49D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:klaro_cookie_\\&_consent_management_project:klaro_cookie_\\&_consent_management:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-1.0", + "versionEndIncluding": "7.x-1.2", + "matchCriteriaId": "99774384-8424-4691-B80A-B099A50591B1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-050", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47705.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47705.json index e9cdb4b652d..4e9714e6298 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47705.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47705.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47705", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:49.727", - "lastModified": "2025-05-16T14:43:56.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:30:59.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iframe_remove_filter_project:iframe_remove_filter:*:*:*:*:*:drupal:*:*", + "versionEndExcluding": "2.0.5", + "matchCriteriaId": "A65898D3-0B18-4478-A5D5-2AC34DCE3FE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iframe_remove_filter_project:iframe_remove_filter:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-1.0", + "versionEndIncluding": "8.x-1.2", + "matchCriteriaId": "E4931093-F6C4-4AEF-89B1-E2ECD9F63338" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-051", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47706.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47706.json index daa1cf2c565..6063a232a3d 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47706.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47706.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47706", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:49.837", - "lastModified": "2025-05-19T15:15:24.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:26:04.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.2.0", + "matchCriteriaId": "BA9E952B-E79E-4637-BDDD-57FA9EE7BA22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-2.16", + "versionEndExcluding": "8.x-4.7", + "matchCriteriaId": "8EE065DA-973F-44D4-BFF5-E3A90B619330" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-052", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47707.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47707.json index 44c5ec25db5..74fa7e8c32c 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47707.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47707.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47707", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:49.963", - "lastModified": "2025-05-16T14:43:56.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:25:56.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.2.0", + "matchCriteriaId": "BA9E952B-E79E-4637-BDDD-57FA9EE7BA22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-2.16", + "versionEndExcluding": "8.x-4.7", + "matchCriteriaId": "8EE065DA-973F-44D4-BFF5-E3A90B619330" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-053", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47708.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47708.json index c05de1dc8e0..20281cc9011 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47708.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47708.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47708", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:50.083", - "lastModified": "2025-05-20T17:15:49.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:25:51.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.2.0", + "matchCriteriaId": "BA9E952B-E79E-4637-BDDD-57FA9EE7BA22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-2.16", + "versionEndExcluding": "8.x-4.7", + "matchCriteriaId": "8EE065DA-973F-44D4-BFF5-E3A90B619330" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-054", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47709.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47709.json index e0006de561e..78ad7686158 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47709.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47709.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47709", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:50.217", - "lastModified": "2025-05-19T15:15:24.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:25:41.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.2.0", + "matchCriteriaId": "BA9E952B-E79E-4637-BDDD-57FA9EE7BA22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-2.16", + "versionEndExcluding": "8.x-4.7", + "matchCriteriaId": "8EE065DA-973F-44D4-BFF5-E3A90B619330" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-055", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-477xx/CVE-2025-47710.json b/CVE-2025/CVE-2025-477xx/CVE-2025-47710.json index 58dfe20ec7a..c67bbb7bb61 100644 --- a/CVE-2025/CVE-2025-477xx/CVE-2025-47710.json +++ b/CVE-2025/CVE-2025-477xx/CVE-2025-47710.json @@ -2,8 +2,8 @@ "id": "CVE-2025-47710", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-14T17:15:50.320", - "lastModified": "2025-05-19T15:15:24.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:24:50.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.2.0", + "matchCriteriaId": "BA9E952B-E79E-4637-BDDD-57FA9EE7BA22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miniorange:miniorange_2fa:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "7.x-2.16", + "versionEndExcluding": "8.x-4.7", + "matchCriteriaId": "8EE065DA-973F-44D4-BFF5-E3A90B619330" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-056", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-478xx/CVE-2025-47827.json b/CVE-2025/CVE-2025-478xx/CVE-2025-47827.json index 6cc25535c9f..af4316a8315 100644 --- a/CVE-2025/CVE-2025-478xx/CVE-2025-47827.json +++ b/CVE-2025/CVE-2025-478xx/CVE-2025-47827.json @@ -2,7 +2,7 @@ "id": "CVE-2025-47827", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-05T14:15:32.263", - "lastModified": "2025-06-05T20:12:23.777", + "lastModified": "2025-06-10T15:15:25.270", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En sistemas operativos IGEL anteriores a la versi\u00f3n 11, el arranque seguro se puede omitir porque el m\u00f3dulo igel-flash-driver verifica incorrectamente una firma criptogr\u00e1fica. En \u00faltima instancia, se puede montar un sistema de archivos root manipulados desde una imagen de SquashFS sin verificar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], "references": [ { "url": "https://github.com/Zedeldi/CVE-2025-47827", @@ -24,6 +59,10 @@ { "url": "https://github.com/Zedeldi/igelfs", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Zedeldi/CVE-2025-47827", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48009.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48009.json index 8c511c03624..97ed64fc5ef 100644 --- a/CVE-2025/CVE-2025-480xx/CVE-2025-48009.json +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48009.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48009", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-21T17:15:58.183", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:29:32.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:single_content_sync_project:single_content_sync:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.12", + "matchCriteriaId": "B67DB79C-32E4-4E30-A24B-BC4E472C7DCC" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-060", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48010.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48010.json index 88108e0bc6a..55f904f4c9f 100644 --- a/CVE-2025/CVE-2025-480xx/CVE-2025-48010.json +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48010.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48010", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-21T17:15:58.370", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:13:51.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:one_time_password_project:one_time_password:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "8.x-1.0", + "versionEndExcluding": "8.x-1.3", + "matchCriteriaId": "393DDBEA-6BC9-4F86-A985-AF91C27D4BC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-061", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48011.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48011.json index 82854141c0f..91fc2862dd0 100644 --- a/CVE-2025/CVE-2025-480xx/CVE-2025-48011.json +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48011.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48011", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-21T17:15:58.553", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:28:15.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:one_time_password_project:one_time_password:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "8.x-1.0", + "versionEndExcluding": "8.x-1.3", + "matchCriteriaId": "393DDBEA-6BC9-4F86-A985-AF91C27D4BC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-062", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-480xx/CVE-2025-48012.json b/CVE-2025/CVE-2025-480xx/CVE-2025-48012.json index 438c600302f..9613c54e92a 100644 --- a/CVE-2025/CVE-2025-480xx/CVE-2025-48012.json +++ b/CVE-2025/CVE-2025-480xx/CVE-2025-48012.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48012", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-05-21T17:15:58.743", - "lastModified": "2025-05-21T20:24:58.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:28:52.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:one_time_password_project:one_time_password:*:*:*:*:*:drupal:*:*", + "versionStartIncluding": "8.x-1.0", + "versionEndExcluding": "8.x-1.3", + "matchCriteriaId": "393DDBEA-6BC9-4F86-A985-AF91C27D4BC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.drupal.org/sa-contrib-2025-063", - "source": "mlhess@drupal.org" + "source": "mlhess@drupal.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48471.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48471.json index 4a08dd7be2f..18d6a6752ee 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48471.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48471.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48471", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-29T16:15:40.650", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:13:08.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,18 +95,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.179", + "matchCriteriaId": "582FD8EB-BA41-4FE4-92AE-F5DC57B57C50" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/commit/e136660e8dbc220454b8d3f646dd1b144e49e9ed", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-484xx/CVE-2025-48472.json b/CVE-2025/CVE-2025-484xx/CVE-2025-48472.json index 63516738d95..44ac15a890f 100644 --- a/CVE-2025/CVE-2025-484xx/CVE-2025-48472.json +++ b/CVE-2025/CVE-2025-484xx/CVE-2025-48472.json @@ -2,8 +2,8 @@ "id": "CVE-2025-48472", "sourceIdentifier": "security-advisories@github.com", "published": "2025-05-29T16:15:40.870", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:13:16.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -73,18 +95,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freescout:freescout:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.179", + "matchCriteriaId": "582FD8EB-BA41-4FE4-92AE-F5DC57B57C50" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/freescout-help-desk/freescout/commit/01c91d2086ddd56778698e557138a178b2f59916", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-f62r-8354-8pqg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-f62r-8354-8pqg", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-491xx/CVE-2025-49136.json b/CVE-2025/CVE-2025-491xx/CVE-2025-49136.json index 9bdefc1957d..88c90dddb16 100644 --- a/CVE-2025/CVE-2025-491xx/CVE-2025-49136.json +++ b/CVE-2025/CVE-2025-491xx/CVE-2025-49136.json @@ -2,13 +2,17 @@ "id": "CVE-2025-49136", "sourceIdentifier": "security-advisories@github.com", "published": "2025-06-09T17:15:29.917", - "lastModified": "2025-06-09T17:15:29.917", + "lastModified": "2025-06-10T14:15:30.510", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "listmonk is a standalone, self-hosted, newsletter and mailing list manager. Starting in version 4.0.0 and prior to version 5.0.2, the `env` and `expandenv` template functions which is enabled by default in Sprig enables capturing of env variables on host. While this may not be a problem on single-user (super admin) installations, on multi-user installations, this allows non-super-admin users with campaign or template permissions to use the `{{ env }}` template expression to capture sensitive environment variables. Users should upgrade to v5.0.2 to mitigate the issue." + }, + { + "lang": "es", + "value": "Listmonk es un gestor de boletines y listas de correo independiente y autoalojado. A partir de la versi\u00f3n 4.0.0 y anteriores a la 5.0.2, las funciones de plantilla `env` y `expandenv`, habilitadas por defecto en Sprig, permiten la captura de variables de entorno en el host. Si bien esto puede no ser un problema en instalaciones de un solo usuario (superadministrador), en instalaciones multiusuario, permite a los usuarios sin superadministrador con permisos de campa\u00f1a o plantilla usar la expresi\u00f3n de plantilla `{{ env }}` para capturar variables de entorno sensibles. Los usuarios deben actualizar a la versi\u00f3n 5.0.2 para mitigar el problema." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -59,6 +63,10 @@ { "url": "https://github.com/knadh/listmonk/security/advisories/GHSA-jc7g-x28f-3v3h", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/knadh/listmonk/security/advisories/GHSA-jc7g-x28f-3v3h", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5226.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5226.json index c7758b7bcc3..897d52591f4 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5226.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5226.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5226", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T03:15:24.783", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:43:41.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -124,26 +124,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:small_crm:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7E5041FC-F03B-4093-9FA3-33F2158A41C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/bleakTS/myCVE/issues/17", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310324", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310324", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.583408", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5227.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5227.json index 61ee72ca8e3..f6d5f9f9d1b 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5227.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5227.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5227", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T04:15:46.050", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:43:19.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -124,26 +124,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:small_crm:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7E5041FC-F03B-4093-9FA3-33F2158A41C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/bleakTS/myCVE/issues/18", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310325", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310325", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.583423", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5230.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5230.json index dfbf952017c..dd1056e4aa3 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5230.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5230.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5230", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T04:15:52.950", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:11:44.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "55E447B4-02C3-4D8B-8E03-2C1A474E2968" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/webzzaa/CVE-/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310329", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310329", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584042", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5231.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5231.json index 6b6275525f1..550b66c739d 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5231.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5231.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5231", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T05:15:24.440", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:11:56.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:company_visitor_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "42FB8B42-C2AF-4A32-86E4-FB5C482806A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zzb1388/zzb1/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310330", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310330", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584438", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5232.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5232.json index 060398897d5..47b504b9426 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5232.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5232.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5232", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T05:15:24.630", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:12:09.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:student_study_center_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "342859F1-38A3-4329-A043-11ECEE45FCE6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/6BXK6/cve/issues/11", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310331", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310331", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584508", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5248.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5248.json index 372f99cef6f..bf6209d99f5 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5248.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5248.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5248", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T16:15:34.867", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:12:22.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:company_visitor_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "42FB8B42-C2AF-4A32-86E4-FB5C482806A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zzb1388/zzb1/issues/8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310350", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310350", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584823", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5250.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5250.json index 3e4c742ee23..e20673513a5 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5250.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5250.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5250", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T17:15:26.790", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:12:33.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:news_portal_project:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A22B1B-0F21-4439-BCFD-81EAB5F70C3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Schatten-42/MyCVE/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310352", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310352", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584911", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5251.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5251.json index ad9dbeaa59b..4cd639a9878 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5251.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5251.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5251", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-27T17:15:26.970", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:12:43.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:news_portal_project:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A22B1B-0F21-4439-BCFD-81EAB5F70C3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Schatten-42/MyCVE/issues/11", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310353", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310353", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584922", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-52xx/CVE-2025-5299.json b/CVE-2025/CVE-2025-52xx/CVE-2025-5299.json index 7e32db80412..2b5254b7cd6 100644 --- a/CVE-2025/CVE-2025-52xx/CVE-2025-5299.json +++ b/CVE-2025/CVE-2025-52xx/CVE-2025-5299.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5299", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-28T12:15:21.307", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:46:55.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,26 +124,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DFE80DE6-C79F-452F-9523-4EC1F9777DA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/RS7325/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310426", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310426", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.585732", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5327.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5327.json index 42acbde36c4..5d0101e74a7 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5327.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5327.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5327", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T21:15:26.557", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:13:37.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +138,76 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:chshcms:mccms:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "BC99D798-1DBB-452F-B55F-544E7C5C8AF1" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E5%89%8D%E5%8F%B0SSRF.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310497", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310497", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.582295", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E5%89%8D%E5%8F%B0SSRF.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5328.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5328.json index 7e309d80e28..7f27278851c 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5328.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5328.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5328", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-29T21:15:26.753", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:14:10.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -118,28 +138,76 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:chshcms:mccms:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "BC99D798-1DBB-452F-B55F-544E7C5C8AF1" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.582297", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5335.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5335.json new file mode 100644 index 00000000000..40e70851c80 --- /dev/null +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5335.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-5335", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-06-10T15:15:25.703", + "lastModified": "2025-06-10T15:15:25.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0010", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5353.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5353.json new file mode 100644 index 00000000000..d01fd6f75a5 --- /dev/null +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5353.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-5353", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2025-06-10T15:15:25.883", + "lastModified": "2025-06-10T15:15:25.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt stored SQL credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-CVE-2025-5353-CVE-CVE-2025-22463-CVE-2025-22455", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5358.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5358.json index c87f970ed23..870cbd144a9 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5358.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5358.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5358", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-30T18:15:33.040", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:14:21.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,22 +144,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:cyber_cafe_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "076A2810-A876-4B7D-B728-BCCE977A7225" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASantsSec/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310652", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310652", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586569", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5359.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5359.json index ddca7f39764..ef75c68b9d7 100644 --- a/CVE-2025/CVE-2025-53xx/CVE-2025-5359.json +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5359.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5359", "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-30T19:15:30.670", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:14:30.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASantsSec/CVE/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310653", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310653", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586590", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json index d98e9d7b52e..84d4e360044 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5443.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5443", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-02T12:15:26.143", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:14:40.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,228 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re9000_firmware:1.0.04.002:*:*:*:*:*:*:*", + "matchCriteriaId": "11F24125-412F-473A-BF34-02284F8DAC2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7424D2C2-BCF4-4B2D-BE59-71B50B13FE77" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6250_firmware:1.0.04.001:*:*:*:*:*:*:*", + "matchCriteriaId": "70728D67-153A-49FA-80E2-0DE9086DA253" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FD49F-4225-47FF-822C-9E4FFB5EE192" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6300_firmware:1.2.07.001:*:*:*:*:*:*:*", + "matchCriteriaId": "1E3A6A93-D598-4F52-808C-EAA45B468066" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25647318-6422-418C-99B8-C806FF490028" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6350_firmware:1.0.04.001:*:*:*:*:*:*:*", + "matchCriteriaId": "0E0A8CCC-BD94-4865-9C0C-B60BD375CDC8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FFD3F65-E520-415D-BAB8-57FACEA5BEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re7000_firmware:1.1.05.003:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC2325A-068F-4B5E-A365-6BF1103E320E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re7000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D04E83B6-EE99-42EB-AA37-895B1467CEDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6500_firmware:1.0.013.001:*:*:*:*:*:*:*", + "matchCriteriaId": "92354C9C-D1B2-4143-803D-DE5EF7842184" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52622B22-2E42-443B-81DA-7C42ECCF0564" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310782", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310782", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584365", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.linksys.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json index d6219b879c4..ee46d1ae940 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5444.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5444", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-02T12:15:26.337", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:14:50.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,228 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re9000_firmware:1.0.04.002:*:*:*:*:*:*:*", + "matchCriteriaId": "11F24125-412F-473A-BF34-02284F8DAC2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7424D2C2-BCF4-4B2D-BE59-71B50B13FE77" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6250_firmware:1.0.04.001:*:*:*:*:*:*:*", + "matchCriteriaId": "70728D67-153A-49FA-80E2-0DE9086DA253" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FD49F-4225-47FF-822C-9E4FFB5EE192" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6300_firmware:1.2.07.001:*:*:*:*:*:*:*", + "matchCriteriaId": "1E3A6A93-D598-4F52-808C-EAA45B468066" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25647318-6422-418C-99B8-C806FF490028" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6350_firmware:1.0.04.001:*:*:*:*:*:*:*", + "matchCriteriaId": "0E0A8CCC-BD94-4865-9C0C-B60BD375CDC8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FFD3F65-E520-415D-BAB8-57FACEA5BEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re7000_firmware:1.1.05.003:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC2325A-068F-4B5E-A365-6BF1103E320E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re7000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D04E83B6-EE99-42EB-AA37-895B1467CEDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6500_firmware:1.0.013.001:*:*:*:*:*:*:*", + "matchCriteriaId": "92354C9C-D1B2-4143-803D-DE5EF7842184" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52622B22-2E42-443B-81DA-7C42ECCF0564" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_7/7.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310783", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310783", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584366", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.linksys.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_7/7.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json b/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json index 2db2cd1ef57..42d5c17efb8 100644 --- a/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json +++ b/CVE-2025/CVE-2025-54xx/CVE-2025-5445.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5445", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-02T13:15:22.910", - "lastModified": "2025-06-02T17:32:17.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:15:02.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,228 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re9000_firmware:1.0.04.002:*:*:*:*:*:*:*", + "matchCriteriaId": "11F24125-412F-473A-BF34-02284F8DAC2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7424D2C2-BCF4-4B2D-BE59-71B50B13FE77" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6250_firmware:1.0.04.001:*:*:*:*:*:*:*", + "matchCriteriaId": "70728D67-153A-49FA-80E2-0DE9086DA253" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FD49F-4225-47FF-822C-9E4FFB5EE192" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6300_firmware:1.2.07.001:*:*:*:*:*:*:*", + "matchCriteriaId": "1E3A6A93-D598-4F52-808C-EAA45B468066" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25647318-6422-418C-99B8-C806FF490028" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6350_firmware:1.0.04.001:*:*:*:*:*:*:*", + "matchCriteriaId": "0E0A8CCC-BD94-4865-9C0C-B60BD375CDC8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FFD3F65-E520-415D-BAB8-57FACEA5BEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re7000_firmware:1.1.05.003:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC2325A-068F-4B5E-A365-6BF1103E320E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re7000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D04E83B6-EE99-42EB-AA37-895B1467CEDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:re6500_firmware:1.0.013.001:*:*:*:*:*:*:*", + "matchCriteriaId": "92354C9C-D1B2-4143-803D-DE5EF7842184" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:re6500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52622B22-2E42-443B-81DA-7C42ECCF0564" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.310784", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.310784", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.584367", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.linksys.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5546.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5546.json index 4fefee04520..909d22b7f62 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5546.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5546.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5546", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T00:15:25.540", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:15:55.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:daily_expense_tracker_system:1.1:*:*:*:-:*:*:*", + "matchCriteriaId": "0EA23473-6F20-499A-9088-4567AACC8157" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/26", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.310996", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.310996", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.586916", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5553.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5553.json index 87123526571..ee32362014b 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5553.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5553.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5553", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T03:15:27.517", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:16:07.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:rail_pass_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6E30595D-1FA7-4037-92CB-26C48EBAA07C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/30", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311005", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311005", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587416", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5554.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5554.json index b83ae43a437..c043d6db90f 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5554.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5554.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5554", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T03:15:27.693", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:16:16.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:rail_pass_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6E30595D-1FA7-4037-92CB-26C48EBAA07C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/31", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311006", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311006", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587417", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5556.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5556.json index acfd292b12f..9951f1ada71 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5556.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5556.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5556", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T04:15:59.447", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:16:25.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:teacher_subject_allocation_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FEDCFA35-D2DD-41B1-9D2F-49FC8443B0A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/32", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311007", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311007", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587474", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5557.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5557.json index 026571940c4..c174cd0e132 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5557.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5557.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5557", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T04:16:00.370", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:16:34.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:teacher_subject_allocation_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FEDCFA35-D2DD-41B1-9D2F-49FC8443B0A2" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/33", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311008", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311008", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587475", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5558.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5558.json index 5953544b485..8b27536b7cf 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5558.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5558.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5558", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T04:16:01.790", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:16:47.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:teacher_subject_allocation_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FEDCFA35-D2DD-41B1-9D2F-49FC8443B0A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/34", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311009", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311009", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587476", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5560.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5560.json index 69ad09d444f..16e572ecb45 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5560.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5560.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5560", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T04:16:03.063", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:10:58.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:curfew_e-pass_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "76BA0E13-5467-4636-8F40-4C4A7DDB785F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/35", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587542", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5561.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5561.json index 29915262ef8..8ac022e8f4f 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5561.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5561.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5561", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T05:15:24.883", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:10:51.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:curfew_e-pass_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "76BA0E13-5467-4636-8F40-4C4A7DDB785F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/36", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311011", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311011", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587543", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5562.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5562.json index 09e0b919cbc..6b727df0e13 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5562.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5562.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5562", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T05:15:25.070", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:10:36.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:curfew_e-pass_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "76BA0E13-5467-4636-8F40-4C4A7DDB785F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/37", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311012", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311012", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587544", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5566.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5566.json index 8ae08e8ad5c..3f8340a76ea 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5566.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5566.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5566", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T05:15:25.247", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:10:27.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:notice_board_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9C74D32F-D702-45FB-A8ED-0F139B2941B8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/38", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311013", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311013", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.587623", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5574.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5574.json index 68e89d8e729..0b8cff0303c 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5574.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5574.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5574", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T07:15:23.060", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:10:15.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:dairy_farm_shop_management_system:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "CF84D11A-CCF0-49D1-8DB0-65186E8D006A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FLYFISH567/CVE/issues/9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311031", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311031", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588778", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5584.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5584.json index 20ba39e3c10..74efc4900c1 100644 --- a/CVE-2025/CVE-2025-55xx/CVE-2025-5584.json +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5584.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5584", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T10:15:21.870", - "lastModified": "2025-06-04T14:54:33.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:10:06.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anujk305:hospital_management_system:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BFF8A1C0-5B5E-433B-B5C8-8D03183335D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Ant1sec-ops/Hospital-management-Systemv4.0-Stored-XSS/blob/main/stored-xss-exploit.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588828", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5600.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5600.json index 0bf02e73c28..206af695bb3 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5600.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5600.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5600", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T18:15:38.817", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:09:46.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,32 +122,93 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5232_b20210713:*:*:*:*:*:*:*", + "matchCriteriaId": "1DD36F94-8646-4794-8878-6F4BF1BF1153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex1200t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F262644E-2558-423E-A19E-7C86A1756FBF" + } + ] + } + ] } ], "references": [ { "url": "https://kn0sinna.notion.site/TOTOLINK-EX1200T-stack-based-BufferOverflow-vulnerability-204b1876cd6e80709ce8dab4778dce55", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311087", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311087", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588075", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://kn0sinna.notion.site/TOTOLINK-EX1200T-stack-based-BufferOverflow-vulnerability-204b1876cd6e80709ce8dab4778dce55", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5602.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5602.json index 26947b90821..f9f1d40664d 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5602.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5602.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5602", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T18:15:39.067", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:09:24.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/Hospital_Management_System/hms_admin_registration.php_sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311088", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311088", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588842", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5603.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5603.json index cc0ef91f71a..c86ca287a9d 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5603.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5603.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5603", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T18:15:39.250", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:09:11.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/Hospital_Management_System/hms_registration.php_sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311089", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311089", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588843", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5604.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5604.json index 94304670ccc..c9e928b0afe 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5604.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5604.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5604", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T19:15:26.160", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:08:53.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0D06E5E-61CD-4D73-AAC1-7B770EE1F25D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/Hospital_Management_System/user-login.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311090", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311090", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588844", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.campcodes.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5606.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5606.json index 6e592e76a6b..2a1902566cf 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5606.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5606.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5606", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T19:15:26.340", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:08:33.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,93 @@ "value": "CWE-77" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC" + } + ] + } + ] } ], "references": [ { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC18-formSetIptv-20653a41781f8077b67af003423cf1da?source=copy_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311092", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311092", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.588933", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://lavender-bicycle-a5a.notion.site/Tenda-AC18-formSetIptv-20653a41781f8077b67af003423cf1da", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5614.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5614.json index 38fcd5a7438..2fd1630eb8c 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5614.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5614.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5614", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T22:15:26.117", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:07:07.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_fire_reporting_system:1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "01586EB7-6A02-47C3-8F88-F082F6078EDF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/Online_Fire_Reporting_System/sqli_search-report-result.php_searchdata.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311100", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311100", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589107", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5615.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5615.json index d5fe3bdb38b..3590dacc306 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5615.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5615.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5615", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-04T22:15:26.293", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:06:57.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_fire_reporting_system:1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "01586EB7-6A02-47C3-8F88-F082F6078EDF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/Online_Fire_Reporting_System/sqli_details.php_requestid.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311101", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311101", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589108", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5631.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5631.json index 0e51ab13671..e927c8d933a 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5631.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5631.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5631", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T03:15:27.377", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:06:48.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,81 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anirbandutta9:news-buzz:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4808771E-72B7-43EF-853F-B3080E9B519B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:content_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02CCDB18-7E64-4F10-9D59-7781D4806075" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/NEWS-BUZZ/sqli_publicposts.php_post.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311118", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311118", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589780", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/YZS17/CVE/blob/main/NEWS-BUZZ/sqli_publicposts.php_post.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5632.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5632.json index 8c4612af291..397eb773fa9 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5632.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5632.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5632", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T04:15:40.417", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:06:36.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,81 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anirbandutta9:news-buzz:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4808771E-72B7-43EF-853F-B3080E9B519B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:content_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02CCDB18-7E64-4F10-9D59-7781D4806075" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/NEWS-BUZZ/sqli_users.php_change_to_admin.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311119", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311119", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589781", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/YZS17/CVE/blob/main/NEWS-BUZZ/sqli_users.php_change_to_admin.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5633.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5633.json index 06f5c67c5ce..cb36c41a5bd 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5633.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5633.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5633", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T04:15:53.537", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:06:27.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,81 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anirbandutta9:news-buzz:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4808771E-72B7-43EF-853F-B3080E9B519B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:content_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02CCDB18-7E64-4F10-9D59-7781D4806075" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/YZS17/CVE/blob/main/NEWS-BUZZ/sqli_users.php_delete.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311120", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311120", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589783", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/YZS17/CVE/blob/main/NEWS-BUZZ/sqli_users.php_delete.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5649.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5649.json index 4523b99fe92..29f94d98eca 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5649.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5649.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5649", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T09:15:23.353", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:05:56.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:student_result_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FBD5779-C1BF-4B42-B4B8-79D7DE7729A5" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Watskip/GeneralResearch/blob/main/Exploits/SRMS/Unauthorized%20privileged%20user%20creation.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311139", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311139", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589458", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Watskip/GeneralResearch/blob/main/Exploits/SRMS/Unauthorized%20privileged%20user%20creation.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5650.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5650.json index fa2d68729ee..01acba0091e 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5650.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5650.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5650", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T10:15:23.020", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:05:23.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,76 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:online_notice_board:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E16CF0E4-F474-4709-8E9D-7CC5ED96DB59" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ubfbuz3/cve/issues/17", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.311140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589819", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ubfbuz3/cve/issues/17", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5651.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5651.json index a1572bef258..3ef0ddd1167 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5651.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5651.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5651", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T10:15:23.270", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:05:12.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:carmelogarcia:traffic_offense_reporting_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5597CF2E-19D3-4E97-ACED-EF034C2E8E0F" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/tuooo/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.311141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589962", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/tuooo/CVE/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5653.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5653.json index cef501d4e76..db638091f89 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5653.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5653.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5653", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T11:15:21.093", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:05:01.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*", + "matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/42", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589964", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5654.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5654.json index 1a2bd5f0f61..bfc473ef92a 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5654.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5654.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5654", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T11:15:22.133", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:04:45.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*", + "matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/43", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311144", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311144", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589965", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5655.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5655.json index 376c587945b..3456d094a09 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5655.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5655.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5655", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T11:15:22.313", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:02:37.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*", + "matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/44", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311145", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311145", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589966", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5656.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5656.json index b121726777e..d2291d63649 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5656.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5656.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5656", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T12:15:23.850", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:02:24.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*", + "matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/45", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311146", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311146", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589967", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5657.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5657.json index 67e953aaa6e..32d351f3104 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5657.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5657.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5657", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T12:15:24.053", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:02:14.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*", + "matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/46", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311147", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311147", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589968", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5658.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5658.json index b6e918655df..bc0f2a1513e 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5658.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5658.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5658", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T13:15:21.717", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:02:02.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*", + "matchCriteriaId": "8C6D9515-0DC3-4727-B5B5-2E6C34362BF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/47", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311148", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311148", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.589979", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5661.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5661.json index 7b3c09f7670..eccd9761858 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5661.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5661.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5661", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T14:15:38.370", - "lastModified": "2025-06-05T20:12:23.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:01:52.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,32 +142,81 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:carmelogarcia:traffic_offense_reporting_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5597CF2E-19D3-4E97-ACED-EF034C2E8E0F" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/tuooo/CVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311151", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311151", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590020", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/tuooo/CVE/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5685.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5685.json index b8f8825833b..77e5a941dec 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5685.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5685.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5685", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T20:15:26.993", - "lastModified": "2025-06-06T16:15:29.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:01:39.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,93 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DB66174F-9460-4B60-AC6B-1B8D5700D6A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B2CBA2D-54D0-4860-A4B4-2BF5238E76AE" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xubeining/Cve_report/blob/main/A%20remote%20code%20execution%20vulnerability%20in%20the%20router%20CH22%20V1.0.0.1%20manufactured%20by%20Shenzhen%20Jixiangtengda%20Technology%20Co.%2C%20Ltd1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311169", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311169", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590153", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/xubeining/Cve_report/blob/main/A%20remote%20code%20execution%20vulnerability%20in%20the%20router%20CH22%20V1.0.0.1%20manufactured%20by%20Shenzhen%20Jixiangtengda%20Technology%20Co.%2C%20Ltd1.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5693.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5693.json index 18925a98930..342dd68ebf8 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5693.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5693.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5693", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T20:15:27.193", - "lastModified": "2025-06-06T14:07:28.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:01:27.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anujk305:human_metapneumovirus_\\(hmpv\\)_-_testing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9F461402-ED2B-4BE1-9F33-4C5AD9CFBC50" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/53", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311209", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311209", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590183", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-56xx/CVE-2025-5694.json b/CVE-2025/CVE-2025-56xx/CVE-2025-5694.json index 5dfe1995a69..2e6276b505a 100644 --- a/CVE-2025/CVE-2025-56xx/CVE-2025-5694.json +++ b/CVE-2025/CVE-2025-56xx/CVE-2025-5694.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5694", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T21:15:22.510", - "lastModified": "2025-06-06T14:07:28.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:01:17.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anujk305:human_metapneumovirus_\\(hmpv\\)_-_testing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9F461402-ED2B-4BE1-9F33-4C5AD9CFBC50" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/54", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590184", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5704.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5704.json index 2b693daab22..797dd3e59a8 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5704.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5704.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5704", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-05T23:15:22.613", - "lastModified": "2025-06-09T15:15:31.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:01:10.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8974B5B-08CE-4EDC-8B76-7074DD336CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/kingmamalv/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311225", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311225", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590429", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/kingmamalv/cve/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5705.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5705.json index afa757c0ce4..10c77c324ba 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5705.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5705.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5705", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T00:15:33.750", - "lastModified": "2025-06-09T15:15:31.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:00:58.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8974B5B-08CE-4EDC-8B76-7074DD336CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/kingmamalv/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311226", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311226", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590432", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/kingmamalv/cve/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5706.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5706.json index fe4746c48d9..106c6554698 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5706.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5706.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5706", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T01:15:25.233", - "lastModified": "2025-06-09T15:15:31.463", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:00:39.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anujk305:human_metapneumovirus_\\(hmpv\\)_-_testing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9F461402-ED2B-4BE1-9F33-4C5AD9CFBC50" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/55", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311227", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311227", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590461", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/55", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5707.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5707.json index d2c25bcccf3..ef863fb3258 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5707.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5707.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5707", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T01:15:25.440", - "lastModified": "2025-06-09T15:15:31.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:00:28.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anujk305:human_metapneumovirus_\\(hmpv\\)_-_testing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9F461402-ED2B-4BE1-9F33-4C5AD9CFBC50" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/56", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311228", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311228", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590473", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/56", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5708.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5708.json index 99c325ec2ea..8e7405a210e 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5708.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5708.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5708", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T01:15:25.630", - "lastModified": "2025-06-09T15:15:31.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:00:17.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,34 +124,76 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8974B5B-08CE-4EDC-8B76-7074DD336CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/YanHanQihomework/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311229", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311229", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590495", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590652", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/YanHanQihomework/cve/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5709.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5709.json index 178f8b46b20..11ea24b166a 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5709.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5709.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5709", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T02:15:22.100", - "lastModified": "2025-06-09T15:15:31.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:00:06.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8974B5B-08CE-4EDC-8B76-7074DD336CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/YanHanQihomework/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311230", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311230", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590501", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/YanHanQihomework/cve/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5710.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5710.json index 4790f2cf936..36e69ba2741 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5710.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5710.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5710", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T02:15:22.283", - "lastModified": "2025-06-09T14:15:23.630", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:59:55.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8974B5B-08CE-4EDC-8B76-7074DD336CE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/YanHanQihomework/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590505", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/YanHanQihomework/cve/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5711.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5711.json index d72ee74d1f4..8c5af50ac6d 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5711.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5711.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5711", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T03:15:25.353", - "lastModified": "2025-06-09T14:15:23.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:59:46.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,32 +122,81 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8974B5B-08CE-4EDC-8B76-7074DD336CE2" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/kingmamalv/cve/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590522", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/kingmamalv/cve/issues/4", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5712.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5712.json index 5bdfb0156b1..72b242e7fc9 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5712.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5712.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5712", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T03:15:26.607", - "lastModified": "2025-06-09T14:15:23.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:46:43.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mysq13/CVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311233", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311233", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590530", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mysq13/CVE/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5716.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5716.json index d2d7d27ed8d..ab37d87fd20 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5716.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5716.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5716", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T04:15:57.157", - "lastModified": "2025-06-09T14:15:24.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:46:32.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mysq13/CVE/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311238", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311238", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590566", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mysq13/CVE/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5721.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5721.json index 99712308083..61296902d1f 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5721.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5721.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5721", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T04:16:00.297", - "lastModified": "2025-06-09T14:15:24.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:47:37.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -124,34 +144,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:student_result_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FBD5779-C1BF-4B42-B4B8-79D7DE7729A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-1-email-field-in-profile-setting", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311241", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311241", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590569", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5722.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5722.json index 4fab448360f..e2867cea635 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5722.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5722.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5722", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T05:15:25.970", - "lastModified": "2025-06-09T14:15:24.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:59:17.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:munyweki:student_result_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5DD5CE8A-702E-4CE4-BDC6-1EA5B0A05272" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-2-academic-term-field-in-academic-terms-page", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311242", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311242", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-2-academic-term-field-in-academic-terms-page", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5723.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5723.json index cc03e481fa0..1693df57968 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5723.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5723.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5723", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T05:15:26.180", - "lastModified": "2025-06-09T14:15:24.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:59:02.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:munyweki:student_result_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5DD5CE8A-702E-4CE4-BDC6-1EA5B0A05272" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-3-class-name-field-in-classes-page", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-3-class-name-field-in-classes-page", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5724.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5724.json index 16af2598e3b..63be71cbb02 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5724.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5724.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5724", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T06:15:31.580", - "lastModified": "2025-06-09T14:15:25.093", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:58:46.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,32 +142,83 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:munyweki:student_result_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5DD5CE8A-702E-4CE4-BDC6-1EA5B0A05272" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-4-subject-field-in-subjects-page", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311244", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311244", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-4-subject-field-in-subjects-page", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5725.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5725.json index ff21758b939..37282221d8e 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5725.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5725.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5725", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T06:15:32.100", - "lastModified": "2025-06-09T14:15:25.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:58:33.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:munyweki:student_result_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5DD5CE8A-702E-4CE4-BDC6-1EA5B0A05272" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md#field-5-remark-field-in-grading-system-page", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311245", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311245", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/0xEricTee/CVE/blob/main/Research/Stored_XSS.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5728.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5728.json index 7089434826d..9a641b88f6b 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5728.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5728.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5728", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T07:15:30.887", - "lastModified": "2025-06-09T14:15:25.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:58:21.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,85 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/mysq13/CVE/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.311248", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311248", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590578", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mysq13/CVE/issues/4", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5732.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5732.json index 32bcacc3b4d..19029cdb39e 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5732.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5732.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5732", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T08:15:21.467", - "lastModified": "2025-06-09T13:15:24.430", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:58:00.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,81 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:carmelogarcia:traffic_offense_reporting_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5597CF2E-19D3-4E97-ACED-EF034C2E8E0F" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/tuooo/CVE/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311259", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311259", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590598", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/tuooo/CVE/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5755.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5755.json index 2e183cdf2ef..5ed8b4130f9 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5755.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5755.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5755", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T10:15:24.800", - "lastModified": "2025-06-06T14:07:28.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:46:20.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Open Source Clinic Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /email_config.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Open Source Clinic Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /email_config.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -120,26 +124,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mysq13/CVE/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311298", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311298", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590639", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5758.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5758.json index d2e7499f0dc..993e0f5d8f4 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5758.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5758.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5758", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T11:15:22.610", - "lastModified": "2025-06-06T14:07:28.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:46:05.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Open Source Clinic Management System 1.0. This affects an unknown part of the file /doctor.php. The manipulation of the argument doctorname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en SourceCodester Open Source Clinic Management System 1.0. Esta afecta a una parte desconocida del archivo /doctor.php. La manipulaci\u00f3n del argumento doctorname provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -120,26 +124,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mysq13/CVE/issues/6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311301", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311301", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590651", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5759.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5759.json index d1e6b0c1caf..7e728cc1095 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5759.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5759.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5759", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T11:15:22.953", - "lastModified": "2025-06-06T14:06:58.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:57:42.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PHPGurukul Local Services Search Engine Management System 2.1. This vulnerability affects unknown code of the file /admin/edit-person-detail.php?editid=2. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Local Services Search Engine Management System 2.1. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/edit-person-detail.php?editid=2. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:local_services_search_engine_management_system:2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "35CEF904-AF60-4F91-BF77-724E6D4C028A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Pjwww13447/pjwww/issues/21", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311302", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311302", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590654", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5761.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5761.json index c821487e6a9..64da54ff668 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5761.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5761.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5761", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T12:15:25.530", - "lastModified": "2025-06-06T14:06:58.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:57:30.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file /edit-family-member.php. The manipulation of the argument memberage leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul BP Monitoring Management System 1.0. Este problema afecta a un procesamiento desconocido del archivo /edit-family-member.php. La manipulaci\u00f3n del argumento \"memberage\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:bp_monitoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5F493132-4599-4574-81E9-346781DC55F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/qingchuana/q1ngchuan/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311303", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311303", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590708", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5762.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5762.json index d80f15b8962..ac8e6c4ccce 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5762.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5762.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5762", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T12:15:25.737", - "lastModified": "2025-06-09T13:15:24.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:57:14.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,32 +142,81 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:patient_record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3A18F6F3-1FDD-4D63-BFB1-6E520B4EAA45" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/bazhahei123/CVE/blob/main/sql_cve_6_5.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311304", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311304", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590749", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/bazhahei123/CVE/blob/main/sql_cve_6_5.pdf", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5763.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5763.json index df19841c907..1d946a9ae50 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5763.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5763.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5763", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T12:15:25.927", - "lastModified": "2025-06-09T13:15:25.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T14:55:49.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,36 +142,101 @@ "value": "CWE-77" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:cp3_firmware:11.10.00.2311090948:*:*:*:*:*:*:*", + "matchCriteriaId": "E8E2B28B-5F9B-4F39-8AC3-F15531696192" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:cp3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16FD7FFD-98DF-46EC-B95C-7B12C172453C" + } + ] + } + ] } ], "references": [ { "url": "https://blog.kevgen.ru/posts/rce_in_tenda_cp3_camera", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/k3vg3n/researches/blob/main/RCE_in_Tenda_CP3_camera.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311305", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311305", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.590784", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/k3vg3n/researches/blob/main/RCE_in_Tenda_CP3_camera.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5782.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5782.json index 35886f2dddd..48c31680406 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5782.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5782.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5782", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T15:15:27.557", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:42:31.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -124,26 +124,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/57", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311330", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311330", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591202", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5783.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5783.json index 41d1dec6b9c..55800134d17 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5783.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5783.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5783", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T16:15:30.960", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-06-10T15:42:17.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -124,30 +124,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/58", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311331", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311331", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591203", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/58", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5784.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5784.json index 69ef78c48d4..0dbb16a0d78 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5784.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5784.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5784", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T16:15:31.180", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:56:59.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/60", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311332", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311332", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591205", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5785.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5785.json index e431bb97f51..749cb193292 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5785.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5785.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5785", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T16:15:31.370", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:56:41.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -124,26 +144,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*", + "matchCriteriaId": "72A1546F-1A48-42AC-9176-95E44E96445C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87818B18-BF90-466D-90C6-D0B4DEBCE330" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Lena-lyy/cve/blob/main/7.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.311333", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311333", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-57xx/CVE-2025-5786.json b/CVE-2025/CVE-2025-57xx/CVE-2025-5786.json index 3097b48d88c..5e84206ce5b 100644 --- a/CVE-2025/CVE-2025-57xx/CVE-2025-5786.json +++ b/CVE-2025/CVE-2025-57xx/CVE-2025-5786.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5786", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-06T17:15:39.037", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:56:32.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -124,26 +144,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x15_firmware:1.0.0-b20230714.1105:*:*:*:*:*:*:*", + "matchCriteriaId": "72A1546F-1A48-42AC-9176-95E44E96445C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87818B18-BF90-466D-90C6-D0B4DEBCE330" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Lena-lyy/cve/blob/main/8.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.311334", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.311334", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591211", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5838.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5838.json index cf3877ea648..843a8705e46 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5838.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5838.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5838", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T16:15:23.440", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:56:21.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/62", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311581", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311581", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591365", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5840.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5840.json index 23a1c836512..0c0b52f9af1 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5840.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5840.json @@ -2,8 +2,8 @@ "id": "CVE-2025-5840", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-07T18:15:25.320", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T15:45:31.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,26 +124,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DFE80DE6-C79F-452F-9523-4EC1F9777DA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/592833263/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.311583", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311583", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591425", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5856.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5856.json index f7b28c2230c..2c4538daaa8 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5856.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5856.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5856", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T03:15:25.353", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:56:12.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PHPGurukul BP Monitoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /registration.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul BP Monitoring Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /registration.php. La manipulaci\u00f3n del argumento emailid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,26 +144,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:bp_monitoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5F493132-4599-4574-81E9-346781DC55F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Rmy4x/cve/blob/main/cve2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311602", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311602", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591426", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5858.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5858.json index 03ed4afff42..f123676d7f9 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5858.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5858.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5858", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T03:15:26.190", - "lastModified": "2025-06-09T12:15:47.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-10T14:55:58.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /patient-report.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Nipah Virus Testing Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /patient-report.php. La manipulaci\u00f3n del argumento \"searchdata\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:nipah_virus_testing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85D720C8-26A6-4C73-974C-285291A71100" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/64", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.311604", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.311604", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.591440", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-58xx/CVE-2025-5886.json b/CVE-2025/CVE-2025-58xx/CVE-2025-5886.json index c61b9a7198e..b36b97a9613 100644 --- a/CVE-2025/CVE-2025-58xx/CVE-2025-5886.json +++ b/CVE-2025/CVE-2025-58xx/CVE-2025-5886.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5886", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-09T16:15:47.440", - "lastModified": "2025-06-09T16:15:47.440", + "lastModified": "2025-06-10T14:15:31.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Emlog up to 2.5.7 and classified as problematic. This issue affects some unknown processing of the file /admin/article.php. The manipulation of the argument active_post leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Emlog hasta la versi\u00f3n 2.5.7 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /admin/article.php. La manipulaci\u00f3n del argumento active_post provoca ataques de cross site scripting. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.571804", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/users/God-mellon/projects/3/views/1?pane=issue&itemId=109223682&issue=God-mellon%7Ctest2%7C2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-59xx/CVE-2025-5911.json b/CVE-2025/CVE-2025-59xx/CVE-2025-5911.json index 7bb15876008..93239e90e30 100644 --- a/CVE-2025/CVE-2025-59xx/CVE-2025-5911.json +++ b/CVE-2025/CVE-2025-59xx/CVE-2025-5911.json @@ -2,13 +2,17 @@ "id": "CVE-2025-5911", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-10T03:15:39.060", - "lastModified": "2025-06-10T03:15:39.060", + "lastModified": "2025-06-10T14:15:31.300", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formDMZ of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en TOTOLINK EX1200T hasta la versi\u00f3n 4.1.2cu.5232_B20210713, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /boafrm/formDMZ del componente HTTP POST Request Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.totolink.net/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/byxs0x0/cve2/blob/main/7.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 785bcde283e..eea6ff32103 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-10T14:00:19.863824+00:00 +2025-06-10T16:00:23.374176+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-10T13:57:42.330000+00:00 +2025-06-10T15:55:48.787000+00:00 ``` ### Last Data Feed Release @@ -33,58 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297269 +297283 ``` ### CVEs added in the last Commit Recently added CVEs: `14` -- [CVE-2025-2918](CVE-2025/CVE-2025-29xx/CVE-2025-2918.json) (`2025-06-10T12:15:23.867`) -- [CVE-2025-43697](CVE-2025/CVE-2025-436xx/CVE-2025-43697.json) (`2025-06-10T12:15:24.097`) -- [CVE-2025-43698](CVE-2025/CVE-2025-436xx/CVE-2025-43698.json) (`2025-06-10T12:15:24.227`) -- [CVE-2025-43699](CVE-2025/CVE-2025-436xx/CVE-2025-43699.json) (`2025-06-10T12:15:24.357`) -- [CVE-2025-43700](CVE-2025/CVE-2025-437xx/CVE-2025-43700.json) (`2025-06-10T12:15:24.483`) -- [CVE-2025-43701](CVE-2025/CVE-2025-437xx/CVE-2025-43701.json) (`2025-06-10T12:15:24.607`) -- [CVE-2025-4577](CVE-2025/CVE-2025-45xx/CVE-2025-4577.json) (`2025-06-10T12:15:24.737`) -- [CVE-2025-4774](CVE-2025/CVE-2025-47xx/CVE-2025-4774.json) (`2025-06-10T12:15:24.917`) -- [CVE-2025-49454](CVE-2025/CVE-2025-494xx/CVE-2025-49454.json) (`2025-06-10T13:15:22.733`) -- [CVE-2025-49455](CVE-2025/CVE-2025-494xx/CVE-2025-49455.json) (`2025-06-10T13:15:23.107`) -- [CVE-2025-49507](CVE-2025/CVE-2025-495xx/CVE-2025-49507.json) (`2025-06-10T13:15:23.283`) -- [CVE-2025-49509](CVE-2025/CVE-2025-495xx/CVE-2025-49509.json) (`2025-06-10T13:15:23.427`) -- [CVE-2025-49510](CVE-2025/CVE-2025-495xx/CVE-2025-49510.json) (`2025-06-10T13:15:23.583`) -- [CVE-2025-49511](CVE-2025/CVE-2025-495xx/CVE-2025-49511.json) (`2025-06-10T13:15:23.747`) +- [CVE-2024-29198](CVE-2024/CVE-2024-291xx/CVE-2024-29198.json) (`2025-06-10T15:15:22.140`) +- [CVE-2024-34711](CVE-2024/CVE-2024-347xx/CVE-2024-34711.json) (`2025-06-10T15:15:22.710`) +- [CVE-2024-38524](CVE-2024/CVE-2024-385xx/CVE-2024-38524.json) (`2025-06-10T15:15:22.880`) +- [CVE-2024-40625](CVE-2024/CVE-2024-406xx/CVE-2024-40625.json) (`2025-06-10T15:15:23.043`) +- [CVE-2025-22455](CVE-2025/CVE-2025-224xx/CVE-2025-22455.json) (`2025-06-10T15:15:23.210`) +- [CVE-2025-22463](CVE-2025/CVE-2025-224xx/CVE-2025-22463.json) (`2025-06-10T15:15:23.383`) +- [CVE-2025-26394](CVE-2025/CVE-2025-263xx/CVE-2025-26394.json) (`2025-06-10T15:15:23.543`) +- [CVE-2025-26395](CVE-2025/CVE-2025-263xx/CVE-2025-26395.json) (`2025-06-10T15:15:23.723`) +- [CVE-2025-27505](CVE-2025/CVE-2025-275xx/CVE-2025-27505.json) (`2025-06-10T15:15:23.903`) +- [CVE-2025-30145](CVE-2025/CVE-2025-301xx/CVE-2025-30145.json) (`2025-06-10T15:15:24.070`) +- [CVE-2025-37100](CVE-2025/CVE-2025-371xx/CVE-2025-37100.json) (`2025-06-10T15:15:24.233`) +- [CVE-2025-46612](CVE-2025/CVE-2025-466xx/CVE-2025-46612.json) (`2025-06-10T15:15:25.027`) +- [CVE-2025-5335](CVE-2025/CVE-2025-53xx/CVE-2025-5335.json) (`2025-06-10T15:15:25.703`) +- [CVE-2025-5353](CVE-2025/CVE-2025-53xx/CVE-2025-5353.json) (`2025-06-10T15:15:25.883`) ### CVEs modified in the last Commit -Recently modified CVEs: `30` +Recently modified CVEs: `130` -- [CVE-2024-12770](CVE-2024/CVE-2024-127xx/CVE-2024-12770.json) (`2025-06-10T12:55:45.537`) -- [CVE-2024-12800](CVE-2024/CVE-2024-128xx/CVE-2024-12800.json) (`2025-06-10T12:52:18.020`) -- [CVE-2024-12808](CVE-2024/CVE-2024-128xx/CVE-2024-12808.json) (`2025-06-10T12:29:25.237`) -- [CVE-2024-12812](CVE-2024/CVE-2024-128xx/CVE-2024-12812.json) (`2025-06-10T12:22:08.690`) -- [CVE-2024-13313](CVE-2024/CVE-2024-133xx/CVE-2024-13313.json) (`2025-06-10T12:01:55.290`) -- [CVE-2024-13357](CVE-2024/CVE-2024-133xx/CVE-2024-13357.json) (`2025-06-10T13:31:40.840`) -- [CVE-2024-13383](CVE-2024/CVE-2024-133xx/CVE-2024-13383.json) (`2025-06-10T13:11:27.890`) -- [CVE-2024-13616](CVE-2024/CVE-2024-136xx/CVE-2024-13616.json) (`2025-06-10T13:10:20.170`) -- [CVE-2024-13619](CVE-2024/CVE-2024-136xx/CVE-2024-13619.json) (`2025-06-10T13:08:49.897`) -- [CVE-2024-13621](CVE-2024/CVE-2024-136xx/CVE-2024-13621.json) (`2025-06-10T13:06:41.540`) -- [CVE-2024-13727](CVE-2024/CVE-2024-137xx/CVE-2024-13727.json) (`2025-06-10T13:05:39.307`) -- [CVE-2024-13823](CVE-2024/CVE-2024-138xx/CVE-2024-13823.json) (`2025-06-10T13:04:43.860`) -- [CVE-2024-13828](CVE-2024/CVE-2024-138xx/CVE-2024-13828.json) (`2025-06-10T13:02:39.683`) -- [CVE-2024-3062](CVE-2024/CVE-2024-30xx/CVE-2024-3062.json) (`2025-06-10T13:57:42.330`) -- [CVE-2024-37262](CVE-2024/CVE-2024-372xx/CVE-2024-37262.json) (`2025-06-10T12:45:23.150`) -- [CVE-2024-4004](CVE-2024/CVE-2024-40xx/CVE-2024-4004.json) (`2025-06-10T13:42:33.290`) -- [CVE-2024-5026](CVE-2024/CVE-2024-50xx/CVE-2024-5026.json) (`2025-06-10T13:36:54.840`) -- [CVE-2024-5791](CVE-2024/CVE-2024-57xx/CVE-2024-5791.json) (`2025-06-10T12:45:23.150`) -- [CVE-2024-5859](CVE-2024/CVE-2024-58xx/CVE-2024-5859.json) (`2025-06-10T12:45:23.150`) -- [CVE-2025-22122](CVE-2025/CVE-2025-221xx/CVE-2025-22122.json) (`2025-06-10T12:15:23.090`) -- [CVE-2025-22123](CVE-2025/CVE-2025-221xx/CVE-2025-22123.json) (`2025-06-10T12:15:23.750`) -- [CVE-2025-31019](CVE-2025/CVE-2025-310xx/CVE-2025-31019.json) (`2025-06-10T13:15:21.477`) -- [CVE-2025-5912](CVE-2025/CVE-2025-59xx/CVE-2025-5912.json) (`2025-06-10T13:15:24.117`) -- [CVE-2025-5913](CVE-2025/CVE-2025-59xx/CVE-2025-5913.json) (`2025-06-10T13:15:24.380`) -- [CVE-2025-5934](CVE-2025/CVE-2025-59xx/CVE-2025-5934.json) (`2025-06-10T13:15:24.570`) +- [CVE-2025-5716](CVE-2025/CVE-2025-57xx/CVE-2025-5716.json) (`2025-06-10T15:46:32.377`) +- [CVE-2025-5721](CVE-2025/CVE-2025-57xx/CVE-2025-5721.json) (`2025-06-10T15:47:37.680`) +- [CVE-2025-5722](CVE-2025/CVE-2025-57xx/CVE-2025-5722.json) (`2025-06-10T14:59:17.903`) +- [CVE-2025-5723](CVE-2025/CVE-2025-57xx/CVE-2025-5723.json) (`2025-06-10T14:59:02.027`) +- [CVE-2025-5724](CVE-2025/CVE-2025-57xx/CVE-2025-5724.json) (`2025-06-10T14:58:46.713`) +- [CVE-2025-5725](CVE-2025/CVE-2025-57xx/CVE-2025-5725.json) (`2025-06-10T14:58:33.113`) +- [CVE-2025-5728](CVE-2025/CVE-2025-57xx/CVE-2025-5728.json) (`2025-06-10T14:58:21.970`) +- [CVE-2025-5732](CVE-2025/CVE-2025-57xx/CVE-2025-5732.json) (`2025-06-10T14:58:00.633`) +- [CVE-2025-5755](CVE-2025/CVE-2025-57xx/CVE-2025-5755.json) (`2025-06-10T15:46:20.973`) +- [CVE-2025-5758](CVE-2025/CVE-2025-57xx/CVE-2025-5758.json) (`2025-06-10T15:46:05.007`) +- [CVE-2025-5759](CVE-2025/CVE-2025-57xx/CVE-2025-5759.json) (`2025-06-10T14:57:42.917`) +- [CVE-2025-5761](CVE-2025/CVE-2025-57xx/CVE-2025-5761.json) (`2025-06-10T14:57:30.623`) +- [CVE-2025-5762](CVE-2025/CVE-2025-57xx/CVE-2025-5762.json) (`2025-06-10T14:57:14.800`) +- [CVE-2025-5763](CVE-2025/CVE-2025-57xx/CVE-2025-5763.json) (`2025-06-10T14:55:49.067`) +- [CVE-2025-5782](CVE-2025/CVE-2025-57xx/CVE-2025-5782.json) (`2025-06-10T15:42:31.557`) +- [CVE-2025-5783](CVE-2025/CVE-2025-57xx/CVE-2025-5783.json) (`2025-06-10T15:42:17.287`) +- [CVE-2025-5784](CVE-2025/CVE-2025-57xx/CVE-2025-5784.json) (`2025-06-10T14:56:59.937`) +- [CVE-2025-5785](CVE-2025/CVE-2025-57xx/CVE-2025-5785.json) (`2025-06-10T14:56:41.397`) +- [CVE-2025-5786](CVE-2025/CVE-2025-57xx/CVE-2025-5786.json) (`2025-06-10T14:56:32.553`) +- [CVE-2025-5838](CVE-2025/CVE-2025-58xx/CVE-2025-5838.json) (`2025-06-10T14:56:21.530`) +- [CVE-2025-5840](CVE-2025/CVE-2025-58xx/CVE-2025-5840.json) (`2025-06-10T15:45:31.043`) +- [CVE-2025-5856](CVE-2025/CVE-2025-58xx/CVE-2025-5856.json) (`2025-06-10T14:56:12.723`) +- [CVE-2025-5858](CVE-2025/CVE-2025-58xx/CVE-2025-5858.json) (`2025-06-10T14:55:58.620`) +- [CVE-2025-5886](CVE-2025/CVE-2025-58xx/CVE-2025-5886.json) (`2025-06-10T14:15:31.160`) +- [CVE-2025-5911](CVE-2025/CVE-2025-59xx/CVE-2025-5911.json) (`2025-06-10T14:15:31.300`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 77d39eb213f..a0081995cf0 100644 --- a/_state.csv +++ b/_state.csv @@ -64032,7 +64032,7 @@ CVE-2013-6950,0,0,d0f4033174b11a0dcfc777b93cff0550e69141ff141c1e33337c773ade0549 CVE-2013-6951,0,0,5bd8681aa049f4a2951b02bb107fc3f7e6cfdd2a5b6dc19f97945499ea846ccd,2025-04-11T00:51:21.963000 CVE-2013-6952,0,0,19bb0b615d5660a88b1895c696b98c8f52d20239c82b79371e3f24967749dab9,2025-04-11T00:51:21.963000 CVE-2013-6953,0,0,03523ae8a09c9dca272e832610f7cb40c062c6ec4e17abb6950e3cde0ec96fc3,2025-04-11T00:51:21.963000 -CVE-2013-6954,0,0,5c7ab08d36502e8475c2f9f66d8e0fe15e2a29ba116c7f8b818c2f90248b4ca3,2025-04-11T00:51:21.963000 +CVE-2013-6954,0,1,695b20043b70c617d8bbfc538fac4e0346404afa693603d72de991190a771e5e,2025-06-10T14:15:22.367000 CVE-2013-6955,0,0,250360140c97234cf3d66191989f22e9e76a7f0499ce73b28b732a52ac793d9c,2025-04-11T00:51:21.963000 CVE-2013-6956,0,0,46d24b47af4e56d58794e46356ff3e9ed0be6ab7598976568872a5d87ddab818,2025-04-11T00:51:21.963000 CVE-2013-6957,0,0,4e4439e78a842ad4601881be694f1c5ff3355961926934ff329a332cdace35f6,2025-04-11T00:51:21.963000 @@ -171451,10 +171451,10 @@ CVE-2021-25250,0,0,96519546aeb87bad9029102e4300efb25b808ffdf1c828af74d8d543fe8fd CVE-2021-25251,0,0,8c8a953b35b3c6e5c868ffcdd7a83f2a6369d515eddabb2af8810ffb1ef353bd,2024-11-21T05:54:37.997000 CVE-2021-25252,0,0,b40ffbd137384ef442803b417e70cc774bb124d382846609d546be19f0b4e85e,2024-11-21T05:54:38.113000 CVE-2021-25253,0,0,cef2da2f2368330d32f768134c44dc06d846a0e31fc9829e407445816d3ee74d,2024-11-21T05:54:38.240000 -CVE-2021-25254,0,0,960f93d5016f6bf3dc79e67dedb064f927d90526e757cd272a96b2f70c33f33b,2025-05-21T20:24:58.133000 -CVE-2021-25255,0,0,729043efb02851b62a590797a0a62d62b1ed141198d79a1963da3cd4c62f6627,2025-05-21T20:24:58.133000 +CVE-2021-25254,0,1,2acb3ad356362788c8f1b42ba57f56fb045f1bd14c8a4d2a71c4e9c807ba7f8f,2025-06-10T15:51:27.827000 +CVE-2021-25255,0,1,c2492daceb4de7c3043a61d34fb7ab4dfccffa6a0345da16ae14ea1b56708d5e,2025-06-10T15:50:05.830000 CVE-2021-25261,0,0,e424baf935cc2db17e7e9aa8dcc27202f3de4105b2e80009de8df8c0cea86d31,2024-11-21T05:54:38.350000 -CVE-2021-25262,0,0,b857ad99d13070b22b601061c16ef46d0218113900d9a324db1fc8a90f601c0d,2025-05-21T20:24:58.133000 +CVE-2021-25262,0,1,fd63f5b952ba6c0d5ab5df718b91f0eb985fd454141e79d30df12e9cf2ec53a8,2025-06-10T15:49:44.813000 CVE-2021-25263,0,0,8a4f44573226c5d23cad36c4ef35264823931930bfb498cd8e6f9bcd97cb7ed2,2024-11-21T05:54:38.477000 CVE-2021-25264,0,0,edc127a1408accde22a7ba9636f26063c7c22770e733c74a28bb9bffa142ac57,2024-11-21T05:54:38.583000 CVE-2021-25265,0,0,a9dd62733ae74882452e725edf4339311bf95ed2c987dce38156b96069be94b8,2024-11-21T05:54:38.700000 @@ -188837,7 +188837,7 @@ CVE-2022-0929,0,0,8eb2d49790094222f3e1b1e3730166c7766d1b2a761363231993be19fa068e CVE-2022-0930,0,0,7b347b917ab4ef7590facfd8cc1f14a3589c2365e60cf8537cf34dbd5d843e67,2024-11-21T06:39:41.333000 CVE-2022-0931,0,0,f1812330146c5798b9336aa7423455b3beda2b64568cff4b83b7cb7d4394737c,2024-02-08T23:15:09.470000 CVE-2022-0932,0,0,232507ae4f08357064c68babd3a4d9bacfbc8e6c28f5337bd203996adcee988d,2024-11-21T06:39:41.500000 -CVE-2022-0934,0,0,0b25a3385a2a92284d1b7a9f1a13f7aaac1922e9baf603649211662e8aeaf7a5,2024-11-21T06:39:41.650000 +CVE-2022-0934,0,1,86832de5cf7e48936676be22b56a1f49afecdd2f9db8d7dce51c808e938464d4,2025-06-10T14:15:23.860000 CVE-2022-0935,0,0,651ca8316ac83d30e136caaddf2acfb39dad79185ec1ace694cc50972630257c,2024-11-21T06:39:41.787000 CVE-2022-0936,0,0,96c0b8cc746ef0f809e1d686ac79f9a6bf6979e23d6aebc05855b0499a68f253,2024-11-21T06:39:41.917000 CVE-2022-0937,0,0,9ef2934705b2deda24915105ab0565e2ecbb7aff04c1c8cbe4e36550322ef32f,2024-11-21T06:39:42.043000 @@ -206399,10 +206399,10 @@ CVE-2022-3976,0,0,8b7eb574300d8293649a80f2eb920531a13102a351572dd9be5d3ad761c0e9 CVE-2022-3977,0,0,1b3d248fee2b390f433d2ff842a3d12766d41799ebb941b58975dc634aac6aa0,2025-04-08T18:15:44.317000 CVE-2022-3978,0,0,9e8def547d5f62c73202afccf8e23bbfcaf00f3e6379f819a46d279fc18b9eab,2024-11-21T07:20:39.780000 CVE-2022-3979,0,0,012bbfb3edbc71141fc3b45d42489bcfc33c65e3c11991d37616f13000b6b0ad,2024-11-21T07:20:39.910000 -CVE-2022-39799,0,0,ef664b8009a660a96f0a31bedbf0e870db991b119ad699043562a07806982c43,2024-11-21T07:18:16.317000 +CVE-2022-39799,0,1,5feefb00406dbb63b228c7668a76aa12ef2f603b9c927a97bfd63b5252e618f5,2025-06-10T14:15:24.157000 CVE-2022-3980,0,0,1f7faea7d5fe07a575a9dfcfecc9c25b908f620050e83e2150071fe7631dd314,2025-04-29T14:15:21.007000 CVE-2022-39800,0,0,2df85a180a5b1fbfe23eba6be754c72cf82c664964002af2a5873351485d49b5,2024-11-21T07:18:16.463000 -CVE-2022-39801,0,0,828fc352c7f1aaa3ead5de2b350d9c6fcc47b7b541823ebb0e2b7cdd4c29bb8c,2024-11-21T07:18:16.603000 +CVE-2022-39801,0,1,e728aa2ceb1ff2410540d4e631cd7e8868a29e4d842567b5f09f8ded56a27428,2025-06-10T14:15:24.650000 CVE-2022-39802,0,0,57fa4c00eeffa723285d0ea3f21652c0656681c7feff312c25a882ff275126cb,2024-11-21T07:18:16.743000 CVE-2022-39803,0,0,812d4b21b76fa4b588b54c6ba111b05b628e7158209aa0c96728f7ecc9329889,2024-11-21T07:18:16.887000 CVE-2022-39804,0,0,a62039c52de28674c58aed13f49647743f6dfb9522eb829522ecc6c327027e86,2024-11-21T07:18:17.030000 @@ -211438,7 +211438,7 @@ CVE-2022-46333,0,0,286a501731caa1ffd562ccb1f6f8205d7df1c526194e326ba1c0d0c8d080c CVE-2022-46334,0,0,a82b3335d9a6bf8efb79d0356a41bdc6e9442aaa9e5d7e266bcb2b306ae7b14e,2024-11-21T07:30:24.627000 CVE-2022-46335,0,0,e259beb92c513d1124dd96e204fdd98d08d712bc5fd51915be9f584c82c4a598,2023-11-07T03:55:34.570000 CVE-2022-46336,0,0,b9b7990e8d019749cbe644f3ba6c710979efbc6fbc868b0a3a3be3136e0194c3,2023-11-07T03:55:34.907000 -CVE-2022-46337,0,0,e97bd5f7fd1563087046f423ed739f0acd293ad2aa3b9bc6c01475dd703b76ef,2024-11-21T07:30:24.783000 +CVE-2022-46337,0,1,7da57ec9b0d0223153c0e02171c37662ce117d223648b0dd03b763886f103706,2025-06-10T14:15:24.907000 CVE-2022-46338,0,0,e9e726a04af67152ae753eadaa2e71e9fd4a11f7298cb4ec71d0886d4bd02e59,2025-04-24T19:15:44.960000 CVE-2022-4634,0,0,305a790119c0c30ea4458e486c1183ab24639122ae391d4aeb8ff84b4a9d9ede,2024-11-21T07:35:38.370000 CVE-2022-46340,0,0,b7104f21186e3258f6ebc7d2620e1fee364c2ad530b8b2b59016d468a6781d97,2025-04-22T16:15:40.820000 @@ -218969,10 +218969,10 @@ CVE-2023-22972,0,0,f05d147ac8f549c33bf31d335750bdd6abea73c5816d27056d8bd89f0a743 CVE-2023-22973,0,0,bccd4224a2674dd63e0124de23cc4e87a3108e0d057eac9cd1e127622ac2de6c,2024-11-21T07:45:44.790000 CVE-2023-22974,0,0,85415b262be91cde3a112e04d995d9163e65d13b859bc6dfd72ba4fee38ce393,2024-11-21T07:45:44.937000 CVE-2023-22975,0,0,eb8873b34352e4a3cc09ef54ad0d7ccdd681ae65fd1d5bde5e48e17ea477cee6,2024-11-21T07:45:45.080000 -CVE-2023-2298,0,1,6b28b31419f1834cd068f4fc950be7991937e24c71506065f925cd0461af5a59,2025-06-10T12:45:23.150000 +CVE-2023-2298,0,0,6b28b31419f1834cd068f4fc950be7991937e24c71506065f925cd0461af5a59,2025-06-10T12:45:23.150000 CVE-2023-22984,0,0,5871116efec6ac4d9f92dbbbffd11ed2b4439b834a7278dcd05b96a53714146d,2024-11-21T07:45:45.220000 CVE-2023-22985,0,0,3e31e1cbf1f1de5ce6cf3c2e1d6a0477b87802898892cf6b79b06c2051f07d7a,2025-02-13T21:15:12.317000 -CVE-2023-2299,0,1,dd788c2e66752404ea540e37b83a284a125ff3de5f00dcbe8f646ade59be6e39,2025-06-10T12:45:23.150000 +CVE-2023-2299,0,0,dd788c2e66752404ea540e37b83a284a125ff3de5f00dcbe8f646ade59be6e39,2025-06-10T12:45:23.150000 CVE-2023-22995,0,0,cf55f9c688d8b67971320ae996f28074061285e48a808803fa692301cea77089,2025-05-05T16:15:29.947000 CVE-2023-22996,0,0,e25b38188607ad82adeaa3e5fc2927767f1b99c04c678932009b45c69faac575,2025-03-20T20:15:28.137000 CVE-2023-22997,0,0,176dbba2a3eee885cb5145bce397d689cea3e2f666028a506b2a5274252c23b0,2025-03-20T20:15:28.333000 @@ -219876,7 +219876,7 @@ CVE-2023-24146,0,0,f408e8268f417d8f723a52d9ab25e857eaeacbce1b75fc7921ff0db95b4e3 CVE-2023-24147,0,0,b92c8e9f3d88cd77b31f782f5baca627927919928373f5a4e85846846fb72538,2025-03-26T19:15:25.273000 CVE-2023-24148,0,0,674fcc1ba994dcc53f4b1b2739b50f2a07dd6c1a6a960c9b2ad892fe2760138b,2025-03-26T15:15:46.813000 CVE-2023-24149,0,0,66a85b28be069e7a828e596d9ee9e4eeb5c531dd78d2e0ad02bb4912ec7fa8ad,2025-03-26T16:15:17.513000 -CVE-2023-2415,0,1,39e81d39ac9a12ff81ce75656edd1c99433224cdb5f01c711c70a59e1d3c0a96,2025-06-10T12:45:23.150000 +CVE-2023-2415,0,0,39e81d39ac9a12ff81ce75656edd1c99433224cdb5f01c711c70a59e1d3c0a96,2025-06-10T12:45:23.150000 CVE-2023-24150,0,0,1978898d6cf410b25d039428bb9737f50542bd2686ecbc60274b16a854707519,2025-03-26T16:15:17.793000 CVE-2023-24151,0,0,46a02063b1cc678e5b41e6a9210a4878d97df355a6783b6ce7880e871dab2c99,2025-03-26T16:15:18.033000 CVE-2023-24152,0,0,0b774f6418b33460f6bdefed5229af905060e1d2ef5ecff57c55e910dab13da3,2025-03-26T16:15:18.273000 @@ -219886,7 +219886,7 @@ CVE-2023-24155,0,0,64de41923a85e49241b8a1b4174c0b66f36a9b352d7968e7119bce55e950b CVE-2023-24156,0,0,fbfbacd0d95c7c78fe2944649f4e3da8ffd28603a028d8536389a6fc85d8bb5f,2025-03-26T15:15:47.047000 CVE-2023-24157,0,0,603fbe9137c0740f9081f35b76cad146834fc9872cfe2eed2412a269598f9a06,2025-03-26T15:15:47.267000 CVE-2023-24159,0,0,7760eaf985df74413d84fd1de8669f9eb5b9e5befb0b84de1f1b3892c8d7d513,2025-03-20T18:15:16.760000 -CVE-2023-2416,0,1,4a826227b459f9bc810291cd15e046c67fc13bdba7efb6a803291c2f901761a2,2025-06-10T12:45:23.150000 +CVE-2023-2416,0,0,4a826227b459f9bc810291cd15e046c67fc13bdba7efb6a803291c2f901761a2,2025-06-10T12:45:23.150000 CVE-2023-24160,0,0,65cc2c933fa4f55a423a0b03c6f5849c561d8a239b685c27ac6c141c47ef1803,2025-03-20T21:15:18.357000 CVE-2023-24161,0,0,19907029bb78340b5658af7b04f0eca42537863c710b03f7f44f2a555d9f52e0,2025-03-20T21:15:18.530000 CVE-2023-24162,0,0,11863c535687637ee2dbdfe25ccb72b7486dd57b5d0f5f801e123d162a733798,2025-03-27T15:15:45.360000 @@ -231504,7 +231504,7 @@ CVE-2023-38814,0,0,9aac3e73f3dea67ff499610adc8aebc4b1bdfe7348e3a0c13ce93d8235db4 CVE-2023-38815,0,0,64c2f1cafe170788d2dae17acd97f143483ea35d344d1c405785fd711091d743,2023-11-07T04:17:24.550000 CVE-2023-38817,0,0,7edd4aee8397d7ea6c17893642f9290cb29a5d9fd7c9db5652d62d6ce572c9ec,2024-11-21T08:14:13.280000 CVE-2023-3882,0,0,444c96bf639eaba5c5e11c4b1be3fd64667922722cd1e3c7603c25d682c81b4f,2024-11-21T08:18:16.887000 -CVE-2023-38823,0,0,aa44355d2943f6c9f7a40cdea13d12711a8057a15c5a620712fe9a0a751b47f2,2024-11-21T08:14:13.427000 +CVE-2023-38823,0,1,f1f6ebba0d7926006072e2372b0eff6b8873ab649bbf35691abff002dc5f01c8,2025-06-10T14:15:25.570000 CVE-2023-38825,0,0,b5dc7921fec8f930362d7e11d3f5725ad347a7557f1899b34604e07196bf8968,2025-03-05T18:49:13.880000 CVE-2023-38826,0,0,d70943162fe82eb28a7a7256c113a957db59bad2f162c4e502e1cf20871c0cca,2024-11-21T08:14:14.593000 CVE-2023-38827,0,0,5767919e44df42a6fdfd6672329daed951da4e76b81458a2e8fcf17855625181,2025-06-03T15:15:39.060000 @@ -232387,7 +232387,7 @@ CVE-2023-39989,0,0,726f571ee9bcf5dc47f2c24a51abc27b099f3763e764b9376d48d987eb909 CVE-2023-3999,0,0,e82adc70575076927945c28ec9abdcb884177ca58c4faef374d14bbf4ef780e1,2024-11-21T08:18:29.967000 CVE-2023-39990,0,0,3d24dc67301ab8a4ce38cf028e16fae81661c2b569698bc948f7c9813a3501e7,2025-01-24T16:08:44.243000 CVE-2023-39991,0,0,74a383be9c4ebbeb72cb131d996b41f84dd1c8560e8c672b2e4694a32709fa2f,2024-11-21T08:16:11.923000 -CVE-2023-39992,0,1,629414a3127aa07d4c3f92dd6eb3b676e6c2a4c2575c5601eba846302ed3da11,2025-06-10T12:45:23.150000 +CVE-2023-39992,0,0,629414a3127aa07d4c3f92dd6eb3b676e6c2a4c2575c5601eba846302ed3da11,2025-06-10T12:45:23.150000 CVE-2023-39993,0,0,62534729c9f89409d47994443940c98799306b492c23b2930a522cb2cdd76001,2025-04-09T15:53:24.323000 CVE-2023-39994,0,0,87a029e29660aeb8f1b2be7e27e623b955ac0289fc3112ecce957361865e016e,2025-01-02T15:15:19.093000 CVE-2023-39995,0,0,fdf718e8170352e73d81bc89750099463548f40b6d848c31e93139491cdf59de,2024-12-13T15:15:20.463000 @@ -236355,7 +236355,7 @@ CVE-2023-45373,0,0,3b30c044b0876fd9b27fda72b50042def7985a679a325ba539da2fc8ec5b0 CVE-2023-45374,0,0,f1203dd7b64ad589bec413cd96a8f0d80dc28337038c25ee7ed3fdb1b97c9933,2024-11-21T08:26:50.750000 CVE-2023-45375,0,0,b273bea762ec9958c31fa5a3446e0533e28499413b60c02fd0e2af2e487f316e,2024-11-21T08:26:50.910000 CVE-2023-45376,0,0,ef3d457b58fba45f17ce4d6107bc429d4bbfd02614bf97c4522138c2028605e7,2024-11-21T08:26:51.047000 -CVE-2023-45377,0,0,1c9e397a777b3337f605e6d6bd800cababc76e8459ae5bc98017433e131a9839,2024-11-21T08:26:51.197000 +CVE-2023-45377,0,1,6f6a6df39103c142c00ebcb5b0645af9ecfab4036318338ea1a3c3d648143e71,2025-06-10T14:15:25.827000 CVE-2023-45378,0,0,f5801878fa05a05bf6487d751c87aa7b88026ea12f0a5b80a54d48f7a76e1b04,2024-11-21T08:26:51.370000 CVE-2023-45379,0,0,9fa15aba8cb43ee89ecc9819d87d1977016a065312229f2b1f8c50f9903c9d1f,2024-11-21T08:26:51.517000 CVE-2023-4538,0,0,ae0d11d8ec6407d88b839e8227ebcad0803179426546d08bdf7cd576cbf1506f,2025-01-23T17:17:07.870000 @@ -237162,7 +237162,7 @@ CVE-2023-46467,0,0,ee69c138fc64569b4a2680db9893225c61f933d13844d37f2a2dec06c7a55 CVE-2023-46468,0,0,5b26955a3193c65b37c2ef9f9ef1fcaa89d93687b2a1cdd82f284f290e4995c0,2024-11-21T08:28:33.380000 CVE-2023-4647,0,0,22a8533f7f191199009e85b567550a48673487fe3a1d01d4c2b445a643800604,2025-05-05T14:12:17.193000 CVE-2023-46470,0,0,bc11e355e9c44593401ba9310cfe1ca146d12cb71553922456bfc5f1fd0e2c4e,2024-11-21T08:28:33.527000 -CVE-2023-46471,0,0,64f27e5db9e3dc11dd6daa4f52e14d55665b0381020ed1c718166e021599e6b6,2024-11-21T08:28:33.670000 +CVE-2023-46471,0,1,5311f63af9a98b846ceb783e9d3becc5318c9db6f02b86d415d13566d6dce489,2025-06-10T14:15:26.130000 CVE-2023-46474,0,0,42f8e24ad47e96f102a785fd1dffe4d442c1799b9f437138569d16c61d20de87,2025-06-03T15:15:42.350000 CVE-2023-46475,0,0,3750704742c926668653b403b3427e7ab0b9ebb5d3f09b11dc63210a79ce85b0,2024-11-21T08:28:33.980000 CVE-2023-46478,0,0,9cd62f743f5e56e366cd21405c36fcbfd89a66ae0fc1710aac938780d922d5ec,2024-11-21T08:28:34.133000 @@ -242534,7 +242534,7 @@ CVE-2023-5549,0,0,d91998a71984a8eba725c2b392783cc21ca8c63497ee0f5f135a0debeba9d4 CVE-2023-5550,0,0,3f1644778a9482ff969db256e12b29b8646045929a2fd3fe3d99640f72b49a39,2024-11-21T08:41:59.613000 CVE-2023-5551,0,0,cb870c0fb1bbc016f06581c55710501beb9eacd67a1ce72427da4d199c6e423c,2024-11-21T08:41:59.760000 CVE-2023-5552,0,0,a61f4f990f4a544d786207a8953356adfb3c74f6ac58df21246574b308e4a277,2024-11-21T08:41:59.903000 -CVE-2023-5553,0,0,8aece5564f1cdd918454ffc60e9cd8a45f3ea87725ce07a97accfe189cbc8020,2024-11-21T08:42:00.047000 +CVE-2023-5553,0,1,3fa326c8beea15694d57ca7b4f172b6c463351f184649fe89d3cbb816f2b1834,2025-06-10T14:15:26.850000 CVE-2023-5554,0,0,5180bd3f76a0eab77411c82d91809cebabd14f24fef84a5d2f934c8d44c0a54d,2024-11-21T08:42:00.210000 CVE-2023-5555,0,0,e211ba1dc358f1d5c15613aaa60cf65129e8fc1481763424f04558350cc792c9,2024-11-21T08:42:00.340000 CVE-2023-5556,0,0,f08fa81939216ecc2e6fb93578d877a2408f26ca503ee07f18c8a7f4236c22f8,2024-11-21T08:42:00.480000 @@ -245042,7 +245042,7 @@ CVE-2024-0970,0,0,1bf1419ef69a6494796789e524bf8a135fa92d97c1a5ca84888328c6bf2e09 CVE-2024-0971,0,0,0fbf66131068316f18a459309bb5abd202482e32856952ee011afb233e507491,2024-11-21T08:47:55.270000 CVE-2024-0972,0,0,e58be32866f33c67069bcbf1a6ed4e3bd511aaced28f98cb0cc22c6a351ffb25,2024-11-21T08:47:55.493000 CVE-2024-0973,0,0,aed8eb330b3491d473a0c3659e7bd14152bc998dac9bc6833bcc7f238dfe0d40,2025-05-05T18:53:59.060000 -CVE-2024-0974,0,0,70c4cd919d9c8bf3449aaf81f5ad45dbd0c858a8c5685af9d8d2e54e1d296972,2024-11-21T08:47:55.893000 +CVE-2024-0974,0,1,d9a281d7eaaf188c3ca11e3061dfa1948807c7e91facbc9ef8fe78ac9864b7c7,2025-06-10T15:54:40.860000 CVE-2024-0975,0,0,927902427c81e78a820da29ca78a14e906507ae17eb4d8834d59df87d8387cd2,2025-02-07T01:11:02.703000 CVE-2024-0976,0,0,c79dabcd2e4b14a1e26c7170d6a384930b136ebbac47519fca77529002b6ebdb,2025-03-07T19:56:59.733000 CVE-2024-0977,0,0,35ddbdf47de5d8a387b9c11235d17fbe38212db92abcf7af4a134a44c909b461,2024-11-21T08:47:56.303000 @@ -247907,7 +247907,7 @@ CVE-2024-12767,0,0,6593b5f975dfd5395109e7e47c23143559826c2e726fd8f4f452ca566e9cb CVE-2024-12768,0,0,cbf9ff20e80bb09942852fa2e956342eb17e9d4f27cf212ff4c0d8344126a292,2025-05-12T01:04:06.597000 CVE-2024-12769,0,0,55524fcacc88be74a2aaad2cb01ce12a99e5536d12743064ed3841d6d460e936,2025-04-29T17:54:19.490000 CVE-2024-1277,0,0,2a6d3c94fab76f050717b5ee760be8ca9b7ac565da514f487f74b0cc7aeb5545,2025-03-04T12:34:06.490000 -CVE-2024-12770,0,1,7c294a16dec2ca96b0f943d13b7ba253be9231034f57bc16710f1103bc10f749,2025-06-10T12:55:45.537000 +CVE-2024-12770,0,0,7c294a16dec2ca96b0f943d13b7ba253be9231034f57bc16710f1103bc10f749,2025-06-10T12:55:45.537000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12772,0,0,70f859d44122fb4ca5be07280e50277d8d4fcf200f73d5f17311f294bd9e06f4,2025-03-28T18:08:42.730000 CVE-2024-12773,0,0,e4c359204f9fafa24c82030ab3b6680e9aaf23ac06487063dcc758fca506c446,2025-05-07T18:54:52.500000 @@ -247936,18 +247936,18 @@ CVE-2024-12794,0,0,6bb67958621fa403e9f361b5ad08b405e435c9a95ea0caa583a82467bdddc CVE-2024-12797,0,0,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000 CVE-2024-12798,0,0,488a2c4e7527f89aadf88a0b958da900c0b1ca920e367bf77296a8bbc1acc4e9,2025-01-03T14:15:24.370000 CVE-2024-12799,0,0,2976aea12fe9362d7bb71c750c2a0ebe37adb6e63168167418978285d30443c8,2025-03-05T15:15:13.127000 -CVE-2024-12800,0,1,52d7321dba0b059fffc06c0f8e721123c42614e9b957c99f62ba4166549289d9,2025-06-10T12:52:18.020000 +CVE-2024-12800,0,0,52d7321dba0b059fffc06c0f8e721123c42614e9b957c99f62ba4166549289d9,2025-06-10T12:52:18.020000 CVE-2024-12801,0,0,8847bb4162cad8847e95f5d549749935a98cd5eaeb3583ac43cc5f1acc6c369c,2025-01-03T14:15:24.500000 CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000 CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe6b6,2025-01-17T03:15:06.973000 CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000 CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 CVE-2024-12807,0,0,38bfdc769ff100a4db3a7e03118441bc3ec526327716b0b998fa92bc88a5e26b,2025-05-11T23:32:35.923000 -CVE-2024-12808,0,1,c2bbaa9c21df8f37ad99655da6b944046c7039fd80bd61ad996f98d1a65117a0,2025-06-10T12:29:25.237000 +CVE-2024-12808,0,0,c2bbaa9c21df8f37ad99655da6b944046c7039fd80bd61ad996f98d1a65117a0,2025-06-10T12:29:25.237000 CVE-2024-12809,0,0,612259b2cda97c5061140929bc611da24ff06e8922b144348f21ead0b174d40b,2025-03-07T07:15:21.380000 CVE-2024-12810,0,0,bc7dd94c64fdb6b3a597ed11abbe18e14edfa7b16233c983106a27c836dd0fee,2025-03-27T01:33:31.260000 CVE-2024-12811,0,0,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000 -CVE-2024-12812,0,1,daecb938e4f98947476ce265ac5bb33ddb666a154961b8642c0962448cd915cb,2025-06-10T12:22:08.690000 +CVE-2024-12812,0,0,daecb938e4f98947476ce265ac5bb33ddb666a154961b8642c0962448cd915cb,2025-06-10T12:22:08.690000 CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-12815,0,0,98810fcf8648fec64bca31a85741fc1bbd90e62f5f053a778963e64e02a51f3a,2025-03-05T10:15:13.563000 @@ -248465,7 +248465,7 @@ CVE-2024-1331,0,0,9d173e21c9dc37e78754849b6df46eb1d20847c006b8fdd8b08b4a7feac03d CVE-2024-13310,0,0,c7d7f61ed943995654d2d7f670a6eebe7c0fd61f9032347d9fa323e6d73361eb,2025-01-31T16:15:33.080000 CVE-2024-13311,0,0,8f1f9a5d171f95a7ba0f9eaa7d2951798d439c8a220f4f2f7df62ba50bf29d83,2025-01-31T16:15:33.280000 CVE-2024-13312,0,0,816e38c6c7477b967986b1dc1563e84c09b9a93286b16913543c3869e5b6d36c,2025-01-31T16:15:33.413000 -CVE-2024-13313,0,1,079fd654c18a6cebb8d8d0d6a399f2d4969e982022fa570f48eac0c412ba26e4,2025-06-10T12:01:55.290000 +CVE-2024-13313,0,0,079fd654c18a6cebb8d8d0d6a399f2d4969e982022fa570f48eac0c412ba26e4,2025-06-10T12:01:55.290000 CVE-2024-13314,0,0,372cc18bdde9568e747e9e5be6901c6bb60d9908e4175478f94091087fbbca48,2025-05-07T17:54:43.590000 CVE-2024-13315,0,0,4230d16584ac54504af61ee61aeb80a96b9eb3fae8091facc2f2a8a9c284a210,2025-02-21T15:44:49.533000 CVE-2024-13316,0,0,cec4f855bc43e4856aaa5b46385f299eca1eb3b2bc1537232953f2705c25950a,2025-02-21T15:28:43.690000 @@ -248512,7 +248512,7 @@ CVE-2024-13353,0,0,81d2cc0d68c32fbd9c01652b235787fa907c22cf877db2ecf0577a18d5178 CVE-2024-13354,0,0,70c8df8ffc765e671782c1c5275e6f7668ade0103b0f3f6fd1920147a9a818fb,2025-02-05T01:36:55.960000 CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000 CVE-2024-13356,0,0,222db37e69d6bffbe0958d093aa878adcd6606bc1c04e8c193a83d53214c4890,2025-05-23T17:21:00.780000 -CVE-2024-13357,0,1,771f9dc4d9355d4789e50f59190d0576323480a67c9b7a290b12bfaa52772dc4,2025-06-10T13:31:40.840000 +CVE-2024-13357,0,0,771f9dc4d9355d4789e50f59190d0576323480a67c9b7a290b12bfaa52772dc4,2025-06-10T13:31:40.840000 CVE-2024-13358,0,0,325a3459d833e21ffea1778bf8000f6b383d5acd1ca06d76e78326d2ceba8c2e,2025-05-26T01:38:44.270000 CVE-2024-13359,0,0,bf6b475e08141f78e88398d59a595da02605e3ff52fdb9b04f37415a17f66af3,2025-03-13T15:15:40.237000 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 @@ -248540,7 +248540,7 @@ CVE-2024-1338,0,0,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462 CVE-2024-13380,0,0,fedf57869c030ff4f3637f3803a39ecc31ada14291471686481185c2393e5fb5,2025-02-18T19:15:13.623000 CVE-2024-13381,0,0,21f32b00e20a9ff4c60932bb7a0f4c78bfd66d210946c18787eab987546a4d37,2025-05-07T20:09:19.373000 CVE-2024-13382,0,0,e5fb92b7994cf896ff2c80fe04a324c17851ebf2e57fd19d81fb00d48a02bccf,2025-05-23T18:51:39.150000 -CVE-2024-13383,0,1,aa4d541fdadc3555a8d8a03d1edf06eb5b5dafca4f4080ebe7c8ac768bc11cab,2025-06-10T13:11:27.890000 +CVE-2024-13383,0,0,aa4d541fdadc3555a8d8a03d1edf06eb5b5dafca4f4080ebe7c8ac768bc11cab,2025-06-10T13:11:27.890000 CVE-2024-13384,0,0,c34ca1e73904819dc81eb56a50d929bdf2eae3fddfa57cb2b3d436fb77a648b0,2025-06-05T14:25:59.603000 CVE-2024-13385,0,0,341bf9c15400cae53ddc0851921970fc70795f9f5473739da6d466eaaa0f96aa,2025-01-18T07:15:08.463000 CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b948,2025-01-17T07:15:27.300000 @@ -248793,12 +248793,12 @@ CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce2 CVE-2024-13613,0,0,76c50a61ea778d8b0fdc92dfa7bd753d24fe469b73d74853265b17aab9b6338e,2025-06-04T20:14:35.327000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 CVE-2024-13615,0,0,9746659970ae7b6453af10041d79de6b54c63744ad607b0ae9659991c32bafa3,2025-05-06T16:08:14.600000 -CVE-2024-13616,0,1,f8a0258e3ee12546fa2d7aaf7c7240747b469deeae2631884a74ca2766cdd91f,2025-06-10T13:10:20.170000 +CVE-2024-13616,0,0,f8a0258e3ee12546fa2d7aaf7c7240747b469deeae2631884a74ca2766cdd91f,2025-06-10T13:10:20.170000 CVE-2024-13617,0,0,eedac14ea6678606200bdc8caad10d687a435a479f513663e25ce802d6aabce2,2025-03-27T16:45:46.410000 CVE-2024-13618,0,0,c24fcd6e7987a85a9bf82460747ca3cafa3c24879596b69df592922370d4e1b9,2025-03-27T16:45:46.410000 -CVE-2024-13619,0,1,228dd097ae834fa4157341812220ab33466207a66baf632c8fe318488c915fc9,2025-06-10T13:08:49.897000 +CVE-2024-13619,0,0,228dd097ae834fa4157341812220ab33466207a66baf632c8fe318488c915fc9,2025-06-10T13:08:49.897000 CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000 -CVE-2024-13621,0,1,41e79a4554aff842641457268cf2ac14befc9bb974cd2028b732d9f40b02d2de,2025-06-10T13:06:41.540000 +CVE-2024-13621,0,0,41e79a4554aff842641457268cf2ac14befc9bb974cd2028b732d9f40b02d2de,2025-06-10T13:06:41.540000 CVE-2024-13622,0,0,9eed0ba9ebfb0e518b42a2712cf92dae96162849ad9816e57eacc260ba8214a4,2025-03-17T14:11:30.240000 CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000 CVE-2024-13624,0,0,576164fc25ab192aae939d08abeb1d440de242329edf58adc5208a0aa5a99240,2025-05-15T20:53:23.813000 @@ -248914,7 +248914,7 @@ CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f CVE-2024-13724,0,0,34258747489035a04daa87bb04b1bc5e6e5e637f7e7b83271cb1adb05cf56adb,2025-03-04T20:50:01.793000 CVE-2024-13725,0,0,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000 CVE-2024-13726,0,0,880bc6c2fe8613f07af78120693f246cb058ccb785a555fa5e0708829e92edbd,2025-05-21T16:04:50.690000 -CVE-2024-13727,0,1,299231c8d4ee4a2fed2c2248b33b4b9b92a70368aa28206e65648d0090c75ff4,2025-06-10T13:05:39.307000 +CVE-2024-13727,0,0,299231c8d4ee4a2fed2c2248b33b4b9b92a70368aa28206e65648d0090c75ff4,2025-06-10T13:05:39.307000 CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac5789f5,2025-02-23T06:15:08.710000 CVE-2024-13729,0,0,43f455d9551e899d69ddf74a933692c26ac1a517409084ab5f20c0f1a53c6197,2025-05-23T18:46:33.653000 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 @@ -249002,12 +249002,12 @@ CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a CVE-2024-13820,0,0,3f47e2346a0959c05c93a153ce340ec2fa8ffde91098f5b8973269a0c75cf098,2025-04-08T18:13:53.347000 CVE-2024-13821,0,0,fa63e95562fe6d0f5424bef06c66fc83e2349c34bd54ad7786c2856fc307ac82,2025-02-25T19:37:29.223000 CVE-2024-13822,0,0,82ccf0fd7722bab25c24e6416ed907e575f02c81b1df43a838280131bbe2a224,2025-05-07T17:26:08.580000 -CVE-2024-13823,0,1,5eac694d58919decf6228c2e6601b3f2df5b97cae3d8db9a30e0cccd2367364e,2025-06-10T13:04:43.860000 +CVE-2024-13823,0,0,5eac694d58919decf6228c2e6601b3f2df5b97cae3d8db9a30e0cccd2367364e,2025-06-10T13:04:43.860000 CVE-2024-13824,0,0,9a24e697ac549f7d4674f794b4484e44cf4c976711aeb4120a01b1e2df50cb0b,2025-03-21T14:55:08.103000 CVE-2024-13825,0,0,c439e603890b8aabcb647bfe30ce08233b4b5913ceafec654aae98c44084238b,2025-05-06T16:17:38.650000 CVE-2024-13826,0,0,5e6f0c7bd24b8c34be283a1fe05744be6d6d50773749f98d4b5fa4f53914f6d9,2025-05-06T16:16:19.067000 CVE-2024-13827,0,0,5c4067cb862f24413fc68125bcc709e40867b80ad9cccc45000563f036236cec,2025-03-05T09:15:09.390000 -CVE-2024-13828,0,1,7358b1e4e39a9a2009775aa970c78fe81a767e1d2202043fc9189fa9622bb823,2025-06-10T13:02:39.683000 +CVE-2024-13828,0,0,7358b1e4e39a9a2009775aa970c78fe81a767e1d2202043fc9189fa9622bb823,2025-06-10T13:02:39.683000 CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,831f4398bca1f1e598b6ff4c23b6b849c16ee98f247d954693e5349168e8ad80,2025-02-28T15:10:48.447000 CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000 @@ -251755,7 +251755,7 @@ CVE-2024-22255,0,0,9e18cdd84446e31a757b60582f5ccca6ae00b45a149bd719400a2670fcf49 CVE-2024-22256,0,0,993de2145831c7f61700fd0ab2fd95ca6c5116ee67bd38000c382e5007dbfbd6,2024-11-21T08:55:54.243000 CVE-2024-22257,0,0,1a5a0b35972b87fc52a9911fc56030783b26d8d4485f5584791104f906536b2c,2025-02-13T18:16:47.687000 CVE-2024-22258,0,0,eaf12a7c8ad5854401b0c00d5a13b7faba9eb9c686cffc7642b0b9f286c4d6d9,2024-12-05T21:15:07.530000 -CVE-2024-22259,0,0,194a58c1207f15255f8add96ae77695d3c94493aa0b0477e6e7be379746cb760,2025-02-13T18:16:47.843000 +CVE-2024-22259,0,1,e72db1d388000a3cb16784350ade9a63f18648cc161480b565e68fbbd2dfc9f0,2025-06-10T15:55:48.787000 CVE-2024-2226,0,0,e107cca46a2655e701e8c46100939a0066c75df49d6d2a8a3cb908f83c971a7b,2025-01-31T01:45:28.230000 CVE-2024-22260,0,0,69cd08889223393ff53cc4a0d777e6e7eee01e3e0b81747bd7ed583cdd66c1f7,2025-03-19T18:15:20.353000 CVE-2024-22261,0,0,46d669194198080bacc4599579892d52d349bfce87a7598545a77f0180f961cd,2025-02-27T15:14:51.320000 @@ -253125,7 +253125,7 @@ CVE-2024-24100,0,0,f4ba34cc95b0190f580ada65b8f03eca5c5575fefce42a920c29ade696fa7 CVE-2024-24101,0,0,8c8c5d78f74164f6c55dbd2d7ee4be4970b1a59ee1d4279b7a0532aeb6a8d129,2025-03-13T17:15:28.980000 CVE-2024-24105,0,0,aa3f860d6915309f408681b2b3119d25030316f86ea69fb09f732429052412d3,2025-03-27T20:15:23.327000 CVE-2024-2411,0,0,80617ce8dc31b8e83eb2beef80c39afc1f74e19ab0ddd6a4eb931ef62e887412,2025-02-13T17:01:09.280000 -CVE-2024-24110,0,0,08e62b495fdb729dbc6065f0f4b980c13ab27ee88d8152ccb823762509962f43,2024-11-21T08:58:55.667000 +CVE-2024-24110,0,1,1fb115b633e50bda2eac87a86b11b52bf18355442d25fa5c13b5c90c0251f50f,2025-06-10T15:50:19.520000 CVE-2024-24112,0,0,fa2e3e7c3fcd453559e34c075845d4fcb313c6fd23214935b122beb782fc0c40,2025-05-08T19:15:58.530000 CVE-2024-24113,0,0,a516f265b8153f0a027545f2a188df9a3586caa127e0706759a4bc7bf3b498c3,2025-05-15T20:15:45.590000 CVE-2024-24115,0,0,3bbcdb03c559df344243325b54bdfce43d333b593de152334d8a64bb5fe49231,2024-11-21T08:58:56.140000 @@ -256375,7 +256375,7 @@ CVE-2024-28276,0,0,1a436bda8dde83214de99ffe7a676d94ddd56c0cacbadb5830dca107ef6af CVE-2024-28277,0,0,22f3695f3ef7a6eee36a865e904ba36f875ce11a46525a27c6dc26bb671dd0ca,2025-03-27T20:15:24.940000 CVE-2024-28279,0,0,371a6db4bfcfaa0c72291cbc279291879c814e6e774d39db4e4c005f7e298918,2025-04-10T14:13:50.587000 CVE-2024-2828,0,0,79034e33018335efad10934558e8b84384b5f2f2133fce62438d617ea963efcf,2024-11-21T09:10:37.513000 -CVE-2024-28283,0,0,ce7a9c7cebaf258528c4f64296c4349b2ca8196425fb75250670fc71bac6a199,2024-11-21T09:06:08.270000 +CVE-2024-28283,0,1,255be6618da6ba643fd0e86bc10a72c22c4b14d4fc8216df35f93b39332c9ac8,2025-06-10T15:52:54.640000 CVE-2024-28285,0,0,d6af77d4c1b881ace2cde569269de77c400ab0444445e8beeda0612dd6100440,2024-11-21T09:06:08.497000 CVE-2024-28286,0,0,0757249cbaa15bc07df502c32c1b53781d52e423b8f162fc3de5e29bd12f0076,2025-06-02T13:59:05.650000 CVE-2024-28287,0,0,a8c69a5ccabbb193237debf5f07040ef395a0f376f000c1003682d3fc4f3b2ce,2024-11-21T09:06:08.947000 @@ -257009,6 +257009,7 @@ CVE-2024-29194,0,0,7e86f1d7dfe4f15cacbcce8cad9be7cfe38c260357c2c48fb92d5a54745ce CVE-2024-29195,0,0,5c94b16253f400ba6bb0ef665df6bebbf3188de73ab0df2806b5c2180f298084,2024-11-21T09:07:46.467000 CVE-2024-29196,0,0,5729f56924a65c817283601b77538f4530c180646008ccfbce73c06b0974e2f9,2025-01-09T16:58:38.057000 CVE-2024-29197,0,0,d61f8497bf6f8a1e63c46af3032bfe6193f99315ea572729f627ecd15c5269ab,2024-11-21T09:07:46.843000 +CVE-2024-29198,1,1,d0fa18fb787ebff7fd70d6dd32baf22ec52072f71beece3bfe47474fc615ca87,2025-06-10T15:15:22.140000 CVE-2024-29199,0,0,09cc6e473adce584cd4120ccee4d6a5ea4bdb7bdd90b7f55d43dc2af16f0e4db,2024-11-21T09:07:47.030000 CVE-2024-2920,0,0,ef6630752834056fa8cc7ab93e97b2cf76454bf49c9150c8d1ff05dd4741ce0a,2024-11-21T09:10:50.530000 CVE-2024-29200,0,0,1a038098db45714aeb3be524d0e7d08f9c875e1682a6c96908006240e85006ba,2024-11-21T09:07:47.207000 @@ -258112,7 +258113,7 @@ CVE-2024-30616,0,0,f690cd9281b12c84866f69af289ad659f87a7bf5a21c0a047e9555ca2a6e1 CVE-2024-30617,0,0,4e4fab9894739cd86b0fa43a3c5304a82b4f65fc3da8a9f40643b10883f8203d,2025-04-18T13:55:07.440000 CVE-2024-30618,0,0,aa74e0bc9460fafdc195f142a91d754bf82056e989f3724a7675a82e5a3c7ef5,2025-04-18T13:54:12.313000 CVE-2024-30619,0,0,aa15af9ede2760db72cc5dd099d038bba420b382cc365ab4a3fc268ddecec6f5,2025-04-18T13:52:46.940000 -CVE-2024-3062,0,1,c4e871a4083e5222f18402b09159d962fa761d0b939797a1b677f2b78a18fe11,2025-06-10T13:57:42.330000 +CVE-2024-3062,0,0,c4e871a4083e5222f18402b09159d962fa761d0b939797a1b677f2b78a18fe11,2025-06-10T13:57:42.330000 CVE-2024-30620,0,0,1b3e51295647ffd13564c7714ebaea0b045e75f1b544faff2d143fb94e342877,2025-03-25T15:15:20.967000 CVE-2024-30621,0,0,0dc11285619aa51aaccf5ba8a6dfa55feacfd678728e357f9c88d654c4236d9b,2024-11-21T09:12:19.600000 CVE-2024-30622,0,0,c184a925147888a48a43c2ebde524eaabf19c129f37a11429143c92e8bcfca27,2025-03-13T21:23:14.273000 @@ -258206,7 +258207,7 @@ CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015a CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000 CVE-2024-3074,0,0,3994c2cc8b929115537999419e9e3fcc4366d9ad5b592787d0ddf7bba23509f6,2024-11-21T09:28:50.367000 CVE-2024-3075,0,0,79e774c47eb18851562c97832d067dddf9a748a04470426bc1a3785e01ac544e,2025-06-10T01:23:11.353000 -CVE-2024-3076,0,0,b1bccbf63a16fe85396c421bd8338b5453b7e47b5e19a26088ca344942b34be7,2024-11-21T09:28:50.613000 +CVE-2024-3076,0,1,9c25a9fc980ba47dd8ff33a0dda6a4a7aeba692a5023e5a085194957609e21be,2025-06-10T15:05:59.980000 CVE-2024-3077,0,0,fcbdd34b10368896e2c3c22301b222fc061a71cd9d47f461bb0e75567c8c2976,2025-01-23T19:21:44.207000 CVE-2024-3078,0,0,f23febdf123fb1167e6d15c44d9f90ae5c695a87735eb2afb067ff82e8b10873,2025-05-07T16:29:10.603000 CVE-2024-3079,0,0,1bb74d40e37f82d88a8767e40d33c9e3ded28d80bc3a1cc49cb882442f6d019c,2024-11-21T09:28:51.060000 @@ -258285,8 +258286,8 @@ CVE-2024-3094,0,0,b9e85c0248ef2cd036bdd4cbb530b96250054f5e14f6d51439fbf04202b0fd CVE-2024-30946,0,0,377a4d69a3316def640c171befad2d35850a0a77388338767e966f749486eb06,2025-04-01T18:05:53.003000 CVE-2024-30949,0,0,31959e66683fc85ff4c276689d94014abb248a7fae0f804c055ab1ee5864556a,2024-08-21T15:48:31.937000 CVE-2024-3095,0,0,cbe393ec5392dd667126d228b108af98c0fb9795feb5e5dd8f573e0e9ea21bf5,2024-11-21T09:28:53.367000 -CVE-2024-30950,0,0,c1797e304f0cff93dabb1fac92746869d9852c169fae68bbd4a04b91570159ed,2024-11-21T09:12:37.683000 -CVE-2024-30951,0,0,61bea179d0012be248c12a7b49faacb006651fd5849426e79eed6512813350ac,2024-11-22T16:15:21.960000 +CVE-2024-30950,0,1,ece6dda16745c005f468a231df1243654886ab826b9231af9d99841e06c6ed34,2025-06-10T15:35:56.830000 +CVE-2024-30951,0,1,8816fa288dcd423eecbfbd1d91bd3dcea3b0699ff8ede203d26791740f8fb504,2025-06-10T15:37:30.170000 CVE-2024-30952,0,0,29254c769977b2a21104b7bc3b0a8b336663d1d5367ab8c3beaf574fad73c358,2025-03-21T21:15:35.300000 CVE-2024-30953,0,0,4a7e5400b8e5906b881b330f0b9fbeb133d6bed4fdcdd7823e19f9c53d690e4e,2024-11-21T09:12:38.263000 CVE-2024-3096,0,0,6ca88014ce9a550e53740c810ba5e3769e3b253e549db68d15a92323deb5b97a,2025-02-13T18:18:09.553000 @@ -260371,7 +260372,7 @@ CVE-2024-33669,0,0,29f56069d6f8dc9c42c264b9e7fdf059d03067714c0582444c764df089feb CVE-2024-3367,0,0,6c0aec54854b096f8e878555e9125762e19df628121d5279f20fc46c0c73cc6e,2024-12-05T14:28:32.407000 CVE-2024-33670,0,0,bd6a675aeea7490463671a77c65b9928115cc573162bb8df88f5a5a7d06516ca,2024-11-21T09:17:22.573000 CVE-2024-33671,0,0,11ca607d730d384f046bfb50f7439d2c55ed7715b188d089c54603d5130dfd65,2024-11-21T09:17:22.737000 -CVE-2024-33672,0,0,fd86431557fd7e838a0ee4b77bf57c14989ebc218c0ba2af1ff70d8e54777aa4,2024-11-21T09:17:22.917000 +CVE-2024-33672,0,1,8b1650c8b10c28f09a3826e003aa8dee352e02a41ac68246cc28a5b89f1f6f51,2025-06-10T15:32:30.493000 CVE-2024-33673,0,0,9a24b7ab7a01fadf3250caec966114047d99e6b4ec5d789a54b1b02a7ffacf1f,2024-11-21T09:17:23.073000 CVE-2024-33677,0,0,8c026ba50efd58074ee9fc7efbb88e0c06b2f621d30fb1b24c5e8cd3b5e751f3,2024-11-21T09:17:23.230000 CVE-2024-33678,0,0,0354f1d0d3f7ae634b20d321a0a5fe882afb0c2e7d1d7eb371cc2e66e362d410,2024-11-21T09:17:23.353000 @@ -261206,6 +261207,7 @@ CVE-2024-34708,0,0,b6103d931f8db49de80394f3b0543e5df8df422ea783f294484fc137bbb2f CVE-2024-34709,0,0,4dd1030c3fb3e8cc330f2849a60862b197aa7ed76d8cc6aef7b0c90fdf00b844,2025-01-03T16:20:01.927000 CVE-2024-3471,0,0,a02b4e38dd6cde89110dd0146c1d954518d16b9add9346ac1806e104b8081110,2025-05-08T18:45:13.967000 CVE-2024-34710,0,0,05f4e9fcad99d59c221e6b73e2dd714053cd2db6f98c9291777c51b4e036ca01,2024-11-21T09:19:14.687000 +CVE-2024-34711,1,1,5d6089d879209ccf65b269a9576c1cd8ba1afbf9fc1d62c31bf9e8380c8db005,2025-06-10T15:15:22.710000 CVE-2024-34712,0,0,cf5b325ebd7ddae90933e1bc277473f4d6cae9ff57c40754d15ebf6965ef4770,2024-11-21T09:19:14.830000 CVE-2024-34713,0,0,b206aae50897a4773c53b884158e7edc900433d8305492b823dfad73b1366504,2024-11-21T09:19:14.963000 CVE-2024-34714,0,0,035cb787cbe8de483ee4a16645070a6bb19000dfd09bef360b4a3489520b8957,2024-11-21T09:19:15.093000 @@ -263203,7 +263205,7 @@ CVE-2024-37259,0,0,b111a5473f46b1bb41290b6efdd564593ab17a36d078c9670b5dbe3c86120 CVE-2024-3726,0,0,9dbd42b932087fa2a65c5516bc71599cb9f7f46ce6c10aecc20bfa3f28ed9d2c,2024-11-21T09:30:15.237000 CVE-2024-37260,0,0,5e9706c77eb49e146468bb0f09d58d0f11318eeda87c7a1ff0d1efbb33f5fb54,2024-11-21T09:23:29.377000 CVE-2024-37261,0,0,7707a4ef346df834825f33497933b4b7045bbe979c2af643480a7b2e1b3fa9dc,2024-11-21T09:23:29.517000 -CVE-2024-37262,0,1,09385f5f7e0e03772e56b28e8a6293dce8825176f5948736af1694f23f000ee0,2025-06-10T12:45:23.150000 +CVE-2024-37262,0,0,09385f5f7e0e03772e56b28e8a6293dce8825176f5948736af1694f23f000ee0,2025-06-10T12:45:23.150000 CVE-2024-37263,0,0,4c0f9b0146e7eea4096ad389b48dc7041fb78e43d90694e2c8b0f0808a0bc3ba,2024-11-21T09:23:29.790000 CVE-2024-37264,0,0,f1bebcc6a6a0f693ac1a2045228d795b947e81bf997e3c96a81d1dc7c6394ae6,2024-11-21T09:23:29.927000 CVE-2024-37265,0,0,33ac5001e3ce913d6259b7e706c199e5216dbab4c34d5a1f92004146060dd2c2,2024-11-21T09:23:30.083000 @@ -264299,6 +264301,7 @@ CVE-2024-38520,0,0,13714aae8a893cb0cb37ad2183ce57b54c82c46e9436fcf730682b217fb72 CVE-2024-38521,0,0,fe59af26beafb1d6ac3c84b505b695c437a2d939550b13e48891788719e24788,2024-11-21T09:26:10.227000 CVE-2024-38522,0,0,163a0807e895af008e0356107c0ee6a4fe30e3d99691e9f9320a4c7a70b91c5e,2024-11-21T09:26:10.720000 CVE-2024-38523,0,0,fdfbc019b8660073143917c00411fa594869f2e30ae1fcc868663ee02238c566,2024-11-21T09:26:11.020000 +CVE-2024-38524,1,1,9a327cd0f04229fc407891537188d586957871cbdfb36bc1898860204e61e51a,2025-06-10T15:15:22.880000 CVE-2024-38525,0,0,227724d36192bb4e2a0af48cfb7f74f403105ccab9b447a7851963b5980ee755,2024-11-21T09:26:11.270000 CVE-2024-38526,0,0,c87b3796553d59f30541329f7bfb421e5fc1050358668dc3718477c22bb7a794,2024-11-21T09:26:11.483000 CVE-2024-38527,0,0,b80767cdd1dc141465114b74c2f216a3b5c29e7d46c42fb40a39c7ea6c867d2d,2024-11-21T09:26:11.813000 @@ -265516,7 +265519,7 @@ CVE-2024-40036,0,0,7ada3b0848f443c38ddf205d8d8de522c0823c689aa06344378a06c3b86ab CVE-2024-40037,0,0,c9d7ad11595234c7fc00a96565c10bcc451b262271af0b09e15e7a97f1e5ab5d,2024-11-21T09:30:53.433000 CVE-2024-40038,0,0,1e018dbdc79d7848d568a5bae781c1ebbdf6def4b78631d9d14756762dc294f2,2025-04-15T17:01:21.050000 CVE-2024-40039,0,0,10bb82b9a485d9a30d97534c1565b71b69e7d2b8a8d12d3cebe34d27e8391f10,2025-03-13T18:15:42.207000 -CVE-2024-4004,0,1,fb6657f16cf3e3db6c5306af2c2d52123b155d11529b185e39b5426df66d88fb,2025-06-10T13:42:33.290000 +CVE-2024-4004,0,0,fb6657f16cf3e3db6c5306af2c2d52123b155d11529b185e39b5426df66d88fb,2025-06-10T13:42:33.290000 CVE-2024-4005,0,0,10ce0801262283a3acf259593f5122037af4b3f2afe41d97e0d5130b74a0b3ba,2025-03-13T22:15:14.523000 CVE-2024-40051,0,0,96ab2490faf9bea7ad7fee897981a553b31642380963c6ce4281331d73ca69b1,2024-11-21T09:30:54.030000 CVE-2024-4006,0,0,46335001e821792447cd234ad2269b9ef6e390364b1771cf570ddd60ee4264a5,2024-12-12T17:10:26.743000 @@ -265749,6 +265752,7 @@ CVE-2024-40619,0,0,b6c460da541b2ec2a65586f5bcd57d99e2dc37254f1699fdd5cff8255e98e CVE-2024-4062,0,0,515e00a3ae6381b8be61020be135008853a85db956ffbe0f8a6e0d20f0a11e8a,2024-11-21T09:42:06.907000 CVE-2024-40620,0,0,76c01cbbb89edea54392977bc3cc4d12b52bafb7330131cde0f0106547ffaa50,2025-01-31T15:03:56.407000 CVE-2024-40624,0,0,2f4f28d0ea57b056f61b3a1537dfa2217ca138a77368e5ac42a5f311c8ff8ebb,2024-11-21T09:31:23.177000 +CVE-2024-40625,1,1,33f10d188485b67cbfaa1553af0375241e3d89cf848ef7095a9bd21f7163648a,2025-06-10T15:15:23.043000 CVE-2024-40626,0,0,6c38b8a06ddf6d9027b0d4dfb20f435e0c3c2837b958e0c059d9ba385cc4486d,2024-11-21T09:31:23.287000 CVE-2024-40627,0,0,ae2a93c7ec256d655b44ce063fa8b7439d8971fa08d9580865a26942fb08219a,2024-11-21T09:31:23.393000 CVE-2024-40628,0,0,704ec36bc278aa476c6d7efd391c49c7cdc61960b99c944487ebef0b137b1694,2025-03-25T20:15:22.063000 @@ -273176,7 +273180,7 @@ CVE-2024-50256,0,0,da7409ea6f37017b9509db8e1d03cd79451c987d7cba2b77a28f3790c1801 CVE-2024-50257,0,0,709c952c23f6f2c85756fa281ef4d4539da93958904cb8b8a9d399dd5e519f97,2024-12-11T15:15:13.913000 CVE-2024-50258,0,0,fab4b733ec19089854abd2b485c2e0835c2194d06a6d8e3284c9718a9dec4d9d,2025-05-02T07:15:56.490000 CVE-2024-50259,0,0,677e0e1bbe84ed4ab3644382c3f2533d28ae11f50a1fc23ec0092a6601ed2d49,2024-11-14T18:24:11.470000 -CVE-2024-5026,0,1,319631cb04e347abbc33aa984d631d9ee475096557f70387f0c314898438bfa4,2025-06-10T13:36:54.840000 +CVE-2024-5026,0,0,319631cb04e347abbc33aa984d631d9ee475096557f70387f0c314898438bfa4,2025-06-10T13:36:54.840000 CVE-2024-50260,0,0,eebfa27953e35b054c12e5e328e8666a82e16db3076b6aad7980b056c6faa68b,2024-11-13T18:47:43.830000 CVE-2024-50261,0,0,859333bc625e392047b9a3e1685efd1bbebb6888814fd4e4b6c9cb690add0bd4,2024-12-11T15:15:14.133000 CVE-2024-50262,0,0,98db827853cb172853751d52de2f37b7074faf6606a02ce0073bf6eea45e8797,2024-12-11T16:15:12.513000 @@ -278214,7 +278218,7 @@ CVE-2024-57906,0,0,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f CVE-2024-57907,0,0,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000 CVE-2024-57908,0,0,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000 CVE-2024-57909,0,0,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000 -CVE-2024-5791,0,1,6aec4f8b08417a8c035d35f38de1d43216110222760f5106aca921f21a31bac0,2025-06-10T12:45:23.150000 +CVE-2024-5791,0,0,6aec4f8b08417a8c035d35f38de1d43216110222760f5106aca921f21a31bac0,2025-06-10T12:45:23.150000 CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000 CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000 CVE-2024-57912,0,0,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000 @@ -278489,7 +278493,7 @@ CVE-2024-5855,0,0,e3b94dbd38c6c583563ce8d4a64fe4513b9c4930c0a9defeba9b12ad8934e6 CVE-2024-5856,0,0,f409ca778bc3503ba0953dabe4d8c60a3ff3078514214d270804de662f27ffeb,2024-11-21T09:48:29.060000 CVE-2024-5857,0,0,d2e8fdc28fe3c9c38fbaa264706e0b39e123de000f9b115383c398aef67773e9,2024-10-04T12:59:27.290000 CVE-2024-5858,0,0,f11336185195d9a02c4221a561cac24b91c76fc2cf1b5733db9d2c5e08e67568,2024-11-21T09:48:29.270000 -CVE-2024-5859,0,1,5a1495b9b4816d523738499f778adb7eae3a8263c0133e1641efb1997e3513df,2025-06-10T12:45:23.150000 +CVE-2024-5859,0,0,5a1495b9b4816d523738499f778adb7eae3a8263c0133e1641efb1997e3513df,2025-06-10T12:45:23.150000 CVE-2024-5860,0,0,095c77da0715fbf43c36d830a751eef0ac354ee45546507c445de80de5c7f86c,2024-11-21T09:48:29.490000 CVE-2024-5861,0,0,79551c286ea0a60702a4e040a1d82751b2d9172a05b7fd4efa55d3a6a7ec9037,2024-11-21T09:48:29.607000 CVE-2024-5862,0,0,5a2b1c4235948f0d50051344c640c2e071e5b5598bc997f246c1be662c3a9c8e,2024-11-21T09:48:29.733000 @@ -285470,8 +285474,8 @@ CVE-2025-22119,0,0,2f09d65d442eb8e910f07964987dcbbe390d5a22774502925136f0f5e2432 CVE-2025-2212,0,0,347acd7cefc790885b47aec20e274251fda79a418815081e1cb51978df1bcde5,2025-03-11T23:15:38.253000 CVE-2025-22120,0,0,56b604066f8d00919ad540ee4d7bb8d05d7f16e6e7e47b03157a55c7abcc60af,2025-05-02T07:15:59.640000 CVE-2025-22121,0,0,0fb672ef784beaceffd7562b0d835f70da34c25516b143ecaaff12a8d6fe22c8,2025-04-17T20:22:16.240000 -CVE-2025-22122,0,1,58f26540291b22254e813ab1085c8cb38b9e0486f52ad4fd26ddb58def241157,2025-06-10T12:15:23.090000 -CVE-2025-22123,0,1,e7155b6b5bc9d26722a323043bf77467a8d9709d9f4036f7cf072a26365f974c,2025-06-10T12:15:23.750000 +CVE-2025-22122,0,0,58f26540291b22254e813ab1085c8cb38b9e0486f52ad4fd26ddb58def241157,2025-06-10T12:15:23.090000 +CVE-2025-22123,0,0,e7155b6b5bc9d26722a323043bf77467a8d9709d9f4036f7cf072a26365f974c,2025-06-10T12:15:23.750000 CVE-2025-22124,0,0,09a256b2c17dbd18800ac7e1feaad9e930636f4d0b9fc0ef1d0f63fe3b204244,2025-04-17T20:22:16.240000 CVE-2025-22125,0,0,4e16b6bb1574e3a218f15739af16c15ef140ff8d253a467b4d70d5fb76ed7c28,2025-04-17T20:22:16.240000 CVE-2025-22126,0,0,d69a5c7dd72e14d4efa2f34c1be80ca5e4fba4822f184eaebcbe35636daca26c,2025-04-25T11:15:45.880000 @@ -285704,12 +285708,14 @@ CVE-2025-2245,0,0,47aa418e84b3637e8df058444cbc8a6e983fd5867c6c8fc35a1ae9e7ece391 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 CVE-2025-22452,0,0,ff338c2acc92abbef6e1d867487b0bd2693a0084a4ebaee6adef7d21d7f92aea,2025-04-07T14:17:50.220000 CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000 +CVE-2025-22455,1,1,f5c85bab51d169291a87cc48b82fdca2e7a3f4c06568634dddf327c5cfb7d69b,2025-06-10T15:15:23.210000 CVE-2025-22457,0,0,38f08c2095b91eac8132ed564fd14198f534885976e426da8483ec6f86216026,2025-05-03T01:00:02.097000 CVE-2025-22458,0,0,1ba3f19027c699ce41e72e1904aec436988c26afbb75393422f286b69c280720,2025-05-17T06:15:17.870000 CVE-2025-22459,0,0,c344631280ed7d336da1ec45c45e7d808eabcfd90e75f4df48c2b7f75013ec85,2025-05-16T14:00:18.793000 CVE-2025-22460,0,0,fa87e8efd2c42f56619d397ee1ae8effa2a4deef13211c7e8012f0ed94f4c60e,2025-05-13T19:35:18.080000 CVE-2025-22461,0,0,bfcd0426d550c133cc0b5bf7ca512847a9828b37dee97a07c0c240c7ee1c7914,2025-05-16T14:00:20.580000 CVE-2025-22462,0,0,02e1e404e23d8a2d6b902e34fe3c6e522b225bf15c1d8026dcd04f539c414ecb,2025-05-13T19:35:18.080000 +CVE-2025-22463,1,1,ada31c76c7a0cb6256803416ebbb2afc10c39ec9761158c770f0d27e345ff0ca,2025-06-10T15:15:23.383000 CVE-2025-22464,0,0,ad03886100376a0ec41e7ca4613c26d39e71749c65342bf61ada280571aba565,2025-05-16T14:00:22.290000 CVE-2025-22465,0,0,908a77a3e0451842fdc9a7db066476e54834da2046dd0ae9eec987eb9b5f29ed,2025-05-16T14:00:28.123000 CVE-2025-22466,0,0,0de7e357b0eeb34991a33cb40eb8f6c143429acd58ed604ea70920f3a5ace203,2025-05-16T14:00:29.970000 @@ -288627,6 +288633,8 @@ CVE-2025-26389,0,0,69c0b4482301cbdf7810c0d66dde175a8a55879ae4b001f43aded2e047b17 CVE-2025-2639,0,0,eeccd7e86f1a8e6550900d4406a77fd9c06a6948c701e759827649fddf007255,2025-03-28T19:33:14.553000 CVE-2025-26390,0,0,d486511ec0cd7e022494115d025bafe0774221a17a1b54e8ff55467ae4483ee1,2025-05-13T19:35:18.080000 CVE-2025-26393,0,0,0084efd52fbee3d09de405c3fe48d1fbc4bd7655a73c657547c37f33e81d553f,2025-03-17T20:15:14.140000 +CVE-2025-26394,1,1,d187a431c7b6d346dd8faced9709a7f52930561861d903d5fb294b9ee634000d,2025-06-10T15:15:23.543000 +CVE-2025-26395,1,1,1ddfc667183206a3d9f2e26ab38d1b914ae8d36afe9bb80f7f7d584830c5b9db,2025-06-10T15:15:23.723000 CVE-2025-26396,0,0,3a6e4823811f7c53f918af9e5601b8b92ea760d35b58b90fdbdace05eb9a40f8,2025-06-02T17:32:17.397000 CVE-2025-2640,0,0,cb1c6d71f05715e40a599d54b3e503bcebd1109fe2ad2ac7ebfd5568ea675609,2025-04-02T14:26:23.040000 CVE-2025-26401,0,0,8a8a5edf8458e0cd9c5461b93aa3dd8d7a38c5486b82730ab0a36983d22db1ca,2025-04-07T14:18:15.560000 @@ -289474,6 +289482,7 @@ CVE-2025-27499,0,0,5f67388884f61cbdff1996d64d628e46709b8560c17359d456ecd050bc05a CVE-2025-2750,0,0,c19d6566d6ac381dc800cb326b33126bef2813593a7d245f0fa739c6c3b30888,2025-03-27T16:45:46.410000 CVE-2025-27500,0,0,86395c642c95ea913b918c9cd4b508655a7fe40b1107839113b18708952581b3,2025-03-05T20:30:38.860000 CVE-2025-27501,0,0,756f7a56a5075d786b5dd1834bf05ac5f72e578e4322539a8fec9c54c550e7fe,2025-04-23T18:45:42.070000 +CVE-2025-27505,1,1,65c408d3041df6458d3d90f3d80e16337d50eee693083889cb1968be95661b19,2025-06-10T15:15:23.903000 CVE-2025-27506,0,0,32b11c29187a961e8c53dd6e270016dcdaaf49f193aef3211b78316072c8bd71,2025-03-06T19:15:27.833000 CVE-2025-27507,0,0,f102904d74ef14427d4091398f7ee4e6c4c616cd5703ded2fd821f8eb925d7b3,2025-03-04T17:15:20.360000 CVE-2025-27508,0,0,f715817c4f100acb64f230b192c6c7e1e45a0a1b5dc8999db4503d2d4c79106a,2025-03-07T18:15:48.033000 @@ -290150,7 +290159,7 @@ CVE-2025-29153,0,0,d8eeeb715e26f12c35487b55680a3c0a724084732ee5fd50de67d20533f23 CVE-2025-29154,0,0,7fdc59b1b8b3db49c174aefb6a6ba9c008546e8b1db8a06cac0366e7a5c5b909,2025-05-08T19:16:02.437000 CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000 CVE-2025-2917,0,0,5e954b3dd80aa4a930dbaedde7b70b19fc8b0dc93229912d7b3d305f418d7302,2025-06-09T17:30:31.340000 -CVE-2025-2918,1,1,613909e2a51855b95045031b84bec6fc7a6aea8b022ee5876305ee5459590153,2025-06-10T12:15:23.867000 +CVE-2025-2918,0,0,613909e2a51855b95045031b84bec6fc7a6aea8b022ee5876305ee5459590153,2025-06-10T12:15:23.867000 CVE-2025-29180,0,0,ff32a6c0b8ae6bd7bd11047aabd317a8e135e12cfa97f8616621804c50d97fba,2025-04-23T18:44:06.733000 CVE-2025-29181,0,0,8ae82d2203a155eaf3356642ff55a59d1f6c904778c798cb5b17b83f75821ff9,2025-04-23T18:21:15.327000 CVE-2025-29189,0,0,acad0707e84ed6f6034c389318c16d4a284ae555c697c4e5480dcb98a0326eea,2025-04-22T17:11:10.127000 @@ -290586,6 +290595,7 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000 CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000 CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000 +CVE-2025-30145,1,1,c4f6262ca91ec00b3e849364599a20f946afa18ed53d291fd401e3e304e41105,2025-06-10T15:15:24.070000 CVE-2025-30147,0,0,21b001eedc5229568faf13723668d957db05c48cdca65d5776148924a813e27d,2025-05-08T14:39:09.683000 CVE-2025-30148,0,0,29af0e59843efb2e7b8c69e1b7f2af701bb5cce0280381a18f1bffe78cdaf0a3,2025-04-11T15:39:52.920000 CVE-2025-30149,0,0,e4e4abf7c26f122ebf56947c382013766c863ede6e6d63f3e59a11447b9eeb84,2025-04-30T16:08:29.560000 @@ -291325,7 +291335,7 @@ CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8 CVE-2025-31016,0,0,9f9353b55280d52026be79b202ae8bc2b442e0024607fdee2a6c539bec9857cb,2025-04-01T20:26:30.593000 CVE-2025-31017,0,0,4d15e426e44fc80241be23dec538166170b7e58fdf6f1e6ffe3f4a6bbdf70361,2025-04-09T20:02:41.860000 CVE-2025-31018,0,0,9405833e484baccbf4a372ae14b5b3c897f0fd637b0228286c0af34a95c332bd,2025-04-17T20:21:05.203000 -CVE-2025-31019,0,1,3d4b8e548615b0c7592279712067028f00a3393e212453365cd3f5b4ebfdecaf,2025-06-10T13:15:21.477000 +CVE-2025-31019,0,0,3d4b8e548615b0c7592279712067028f00a3393e212453365cd3f5b4ebfdecaf,2025-06-10T13:15:21.477000 CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000 CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000 CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000 @@ -291433,9 +291443,9 @@ CVE-2025-3113,0,0,93a1533aa28bc362b53faa22de520bb342720cec250f2cfe8585a964488e97 CVE-2025-31130,0,0,acf3990daefd59c21fd5a299f504c7568622322ae9d561fcc713ae7aa1c998a6,2025-04-07T14:18:15.560000 CVE-2025-31131,0,0,5938448e342afcc37e78bd20633f96d125d20b3c4d2f3baca4ca3198c733c0ea,2025-05-09T14:04:06.663000 CVE-2025-31132,0,0,529f4cea3faea434883eda729fc063219493e8e091a7f2f10b391b34138f5f80,2025-04-01T20:26:11.547000 -CVE-2025-31134,0,0,407236c32209cb5c2cb94399b967058e5cc6fdc8efc8161b4dafac0dba576256,2025-06-05T20:12:23.777000 +CVE-2025-31134,0,1,2773f031652fd95c6b39926f090583c463eb26839cd44ae6b696340c166207b4,2025-06-10T15:08:24.457000 CVE-2025-31135,0,0,207e0c0576bd29325f457097be93c7a44eb5e24c5f685d26d2830ea953a650cb,2025-04-02T14:58:07.527000 -CVE-2025-31136,0,0,984fa254426bdc427ea422e37592df4df31700ffd46720a9ca24c725c9b44230,2025-06-05T20:12:23.777000 +CVE-2025-31136,0,1,e56123afe28cd38ca229df762d303518a4c89d3b460426dc3d13029c75ba90b2,2025-06-10T15:08:13.370000 CVE-2025-31137,0,0,68ee066855a1ed540acafdd46a9114f6082667580fb68d589f14ffae7073796c,2025-04-01T20:26:01.990000 CVE-2025-31138,0,0,082239a994f84f895f28ca91baa1d97931f8adb4927719990c0f96236ec2630c,2025-04-08T18:14:17.307000 CVE-2025-31139,0,0,4e1f766285d49f2c4e08f1555fb377b28da0878f00cfc1002dd12ef36cc0a8e6,2025-05-16T14:51:10.163000 @@ -291900,9 +291910,9 @@ CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bb CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000 CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000 CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000 -CVE-2025-31710,0,0,8697c4c01f54bbcee011347c1a38daaa8a4583593d3477afcb4a5cde160df591,2025-06-04T14:54:33.783000 -CVE-2025-31711,0,0,84b2ae9f8d2aebdbec17ad11b2ad830c114c5f3b19d006f39db2d4c2003fbdc7,2025-06-04T14:54:33.783000 -CVE-2025-31712,0,0,76997365817618d2fd45cfec3b555611f3996fdff38a8a8dab9fd8717a05a0e6,2025-06-04T14:54:33.783000 +CVE-2025-31710,0,1,66b943a0cc10a097358c13445d1f5df7386c2942496f3871e72b75f2365fb784,2025-06-10T15:15:23.847000 +CVE-2025-31711,0,1,a1e429f12e9dd794426c9c92b102152b28ef2a4735f38b55311c0d017b7aca8b,2025-06-10T15:15:41.490000 +CVE-2025-31712,0,1,1d5d25aedcee6f3c481a11263afb79b35492febcf0420e960a67b0b1b19781b3,2025-06-10T15:15:48.273000 CVE-2025-3172,0,0,7ef3d20b4569576ecc044e7634dd1d1d020ed6e5c64b90d6184f578b093246a4,2025-05-15T20:07:38.310000 CVE-2025-31720,0,0,ce62208919cdfa9fb252b714bb7365bb606e8689ef37f84aded5e8ad22c74887,2025-04-29T14:03:21.570000 CVE-2025-31721,0,0,91995a06eddb99842482cec92b823782bf8b0af6c3c204a05bb9543bd15215b4,2025-04-29T13:56:43.860000 @@ -293371,6 +293381,7 @@ CVE-2025-37094,0,0,80139cc2d7d5befc05f51667ec682f5c962f80ed8c480fa2b154914d7c800 CVE-2025-37095,0,0,548306b50795731dc5b60cc61287457cda97af8c1838c1288092ea043e39871d,2025-06-02T17:32:17.397000 CVE-2025-37096,0,0,78aa33aa6c14b79fab9fdbbfe82eac38fd3ab2a2406b66867916373e1f7d70de,2025-06-02T17:32:17.397000 CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000 +CVE-2025-37100,1,1,4d4f1fbe648eb6f78480eef9aabca21816bafbae1c975c76fb5ee1f1e465f6a7,2025-06-10T15:15:24.233000 CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000 CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000 CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000 @@ -294635,11 +294646,11 @@ CVE-2025-4363,0,0,cfc7942feeb9a0f9f6312b42fa943d50981f3a9d84068f01e49e58a260df8f CVE-2025-4364,0,0,7abc96b4496bfef1269854d9d4450b426753c52eb291c976d683ed2fcf48245a,2025-05-21T20:24:58.133000 CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c146,2025-05-23T15:55:02.040000 CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000 -CVE-2025-43697,1,1,e9ffc798fea053198fb17bed37bab0c158ecec381f08a3543087469e372613ed,2025-06-10T12:15:24.097000 -CVE-2025-43698,1,1,65fb003d23e6d635c0b01ee008fb0dd98fed725cdf56451a4ef99df38c52e29a,2025-06-10T12:15:24.227000 -CVE-2025-43699,1,1,1d39cab8eb945db8a47c3cddf7010f12f0acd959ee68a355398abdd3563ec5f6,2025-06-10T12:15:24.357000 -CVE-2025-43700,1,1,c2cc58f0e604eee544996cc7d907ffb95b0541f1f14e0033ad5f656f887ab519,2025-06-10T12:15:24.483000 -CVE-2025-43701,1,1,fe2e34423b7eb971d6d18dd04633ff9c2283f50df1b163605e07e8bc0d13083a,2025-06-10T12:15:24.607000 +CVE-2025-43697,0,0,e9ffc798fea053198fb17bed37bab0c158ecec381f08a3543087469e372613ed,2025-06-10T12:15:24.097000 +CVE-2025-43698,0,0,65fb003d23e6d635c0b01ee008fb0dd98fed725cdf56451a4ef99df38c52e29a,2025-06-10T12:15:24.227000 +CVE-2025-43699,0,0,1d39cab8eb945db8a47c3cddf7010f12f0acd959ee68a355398abdd3563ec5f6,2025-06-10T12:15:24.357000 +CVE-2025-43700,0,0,c2cc58f0e604eee544996cc7d907ffb95b0541f1f14e0033ad5f656f887ab519,2025-06-10T12:15:24.483000 +CVE-2025-43701,0,0,fe2e34423b7eb971d6d18dd04633ff9c2283f50df1b163605e07e8bc0d13083a,2025-06-10T12:15:24.607000 CVE-2025-43703,0,0,d6625a868be77b8d7893d215165a3a98f3361eec5aed450c8d69ce3a9dfaf391,2025-04-17T20:21:48.243000 CVE-2025-43704,0,0,e4a4f68c1c515be2555ad90b5dc0fde58f5ff1d76445660f48da718ee733becf,2025-04-17T20:21:48.243000 CVE-2025-43708,0,0,d38c003beeae09584e47fb48659652128bc4a5d2c5ae13da147de319358e0588,2025-04-17T20:21:48.243000 @@ -295027,7 +295038,7 @@ CVE-2025-45752,0,0,bb720a75a25153c4b67014caa45a3f9b58d2b0bec0c849f14f25b8ea2041a CVE-2025-45753,0,0,214d28714b713bde0d2189fb494c4cf3b7e4c41bc036574809186d613ce4c8d3,2025-05-23T15:55:02.040000 CVE-2025-45754,0,0,a302b00636684b408f789314fb369b31d357d4a411342b7876cf26fe121b9472,2025-05-21T20:24:58.133000 CVE-2025-45755,0,0,caf4a0a5971f4cf5680b0cad2b710bbea10da89f97ba8578c52219a358cfcd66,2025-05-21T20:24:58.133000 -CVE-2025-4577,1,1,4a91aca368e2246a8d948570e9d07d7ca1b03157298c3f0691b2680d7569c16e,2025-06-10T12:15:24.737000 +CVE-2025-4577,0,0,4a91aca368e2246a8d948570e9d07d7ca1b03157298c3f0691b2680d7569c16e,2025-06-10T12:15:24.737000 CVE-2025-45779,0,0,c093a7d91bfb997294cab32f2ebe8a712075ae66c80f7c18bdd9520e3509f542,2025-05-12T22:15:26.173000 CVE-2025-4578,0,0,8451b1c03045c8ad3abf8c71774c6b63bc79023720225fdd15b30152793b6197,2025-06-04T20:07:45.857000 CVE-2025-45787,0,0,839c7946d0f8e2e3f388e984cf0b3d259f804d96030c23335dfd861ac831e334,2025-05-16T15:38:25.723000 @@ -295091,7 +295102,7 @@ CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112 CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000 CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000 CVE-2025-46154,0,0,28136877062a9fbae66fc92d86286e5d62e1cd8a9e62fd05c5a06eb514bf383d,2025-06-09T18:06:28.423000 -CVE-2025-46173,0,0,f1e36ec33a02fee01307659dfca8b67a706a6ca070153a7459464089a027cd3e,2025-05-28T15:01:30.720000 +CVE-2025-46173,0,1,4405d31e0bbca77b9a85dba04df7d6cbed12d0763cfb8e942421606ded04a3cf,2025-06-10T15:12:53.720000 CVE-2025-46176,0,0,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000 CVE-2025-46178,0,0,03490af67e720d043aaded16e8fab183fbdcb1738f48f0dfd5e5618fade2183c,2025-06-09T16:15:40.800000 CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000 @@ -295100,8 +295111,8 @@ CVE-2025-46190,0,0,49ae57538389712e46bb1f8218d4d6fdb9fc8500296b0c348e5059e767ffc CVE-2025-46191,0,0,fbc9ea533655e0e26f4f4c6da17e48ffe3ff5c2de6b7f56de9323673ae72787b,2025-05-22T18:52:07.867000 CVE-2025-46192,0,0,1a30aaeba5d079cb7681705ff9da1042bb0e2a199d3814812fc4bc48ab6a2a7b,2025-05-22T18:47:48.530000 CVE-2025-46193,0,0,b5728a298f7e860e076276348cca2409ba95c6dfd5dcdd661df2cd3fcae8c09b,2025-05-22T18:49:22.817000 -CVE-2025-46203,0,0,b48a8a5375e291cd9972fa8100214b1fc09cfd4af961e017d4389d7a4b55110e,2025-06-05T20:12:23.777000 -CVE-2025-46204,0,0,9f314fc67a77ecf17ec670cf3f4cb33a56ef9271880900b51d36404140522756,2025-06-05T20:12:23.777000 +CVE-2025-46203,0,1,be953e8984307aae070f8f20f44040a65022d6e23c76a670663628bd657edc09,2025-06-10T15:07:28.800000 +CVE-2025-46204,0,1,75ae4b5b42744427789fa14d0febcfcba5e97dc93c09cc82148b678635dca115,2025-06-10T15:07:19.043000 CVE-2025-46216,0,0,aeeb168de31af46b00554fe4e8c894f6f952bf91677cd58baacfa2edfa3da131,2025-04-23T03:15:22.333000 CVE-2025-46217,0,0,c0708bfcbcfb8b1f8589ac8ee7b6149158182bec9e1515e0d8ddabb4f9f96f81,2025-04-23T03:15:22.403000 CVE-2025-46218,0,0,b4d34877020ce88bfe5e738c92a5cdebc137bb9b383057afd40e6895a6e2e87c,2025-04-23T03:15:22.457000 @@ -295374,6 +295385,7 @@ CVE-2025-46599,0,0,f3c297c657fcc4808e413ffc4a851e0a3ee55a1d48f62ec84808ef43a1b8a CVE-2025-4660,0,0,47aa6906241bb2d769039ddcd2c20f6e64e1d61cff1d884ad57154ef56ead789,2025-05-15T18:38:32.803000 CVE-2025-46610,0,0,4ef5ea3231fa4eac2642fd333881441a47f939bd8303cb3286530fbf8cc47c86,2025-05-12T22:15:26.660000 CVE-2025-46611,0,0,516776552286ca0c3defcd46a503a129bce789d2f1a0d800a6114852772e8ebc,2025-05-12T22:15:26.807000 +CVE-2025-46612,1,1,19525c59ac4bfdcb4c0fda4baacbc1f01bec80a796b41fe90399a8585672cb80,2025-06-10T15:15:25.027000 CVE-2025-46613,0,0,4e69b4cc881e4a38a0c593bcf55a3a9f4be82e9fe1b8d7c10c86959cefa4a4c1,2025-04-29T13:52:28.490000 CVE-2025-46614,0,0,a1f2104588668560a01f61ff5e7e61263dcf0af77c6af3863b6b7e1062879e18,2025-04-29T13:52:10.697000 CVE-2025-46616,0,0,a3467bedc13913153241aada047204661f44b5d0ba1c446ec0cc09c7d5e149d6,2025-04-29T13:52:28.490000 @@ -295852,16 +295864,16 @@ CVE-2025-47693,0,0,e89b1a6670330d4d22f8cc221b89668c8cd5df047d9ad3b00d816d91b773e CVE-2025-47697,0,0,7017cb143ae00e39a6be41658c8a7e8e23de50ae8206815ae5f36b7139369e22,2025-06-04T19:57:39.970000 CVE-2025-4770,0,0,5f368204f0ca7aae3eb62fd6ef282ad79cf1325c5be1729c43aaaf95e2bf0dbb,2025-06-05T19:35:54.267000 CVE-2025-47701,0,0,85bb7ccaf297c9dca91c85cb3376ebab43abe419ae7564896c8e3565de9158da,2025-05-20T17:15:49.160000 -CVE-2025-47702,0,0,69356e692b2460ffa941a7d3976049902a43456cf1e503712f5b2444ac03a9b8,2025-05-16T14:43:56.797000 -CVE-2025-47703,0,0,bd0c128a404fc43b93902c0a4888431136875c8309ad71af5b4f81b9467b4e29,2025-05-20T17:15:49.330000 -CVE-2025-47704,0,0,c9b412585772471a2c621643ecf65e6a9968e12af6da61174949a09ab34d0518,2025-05-20T17:15:49.500000 -CVE-2025-47705,0,0,037d439e9e45ca879c25b8ce30ba4e4ce774b7a28bf32bc13d60f7350ba6273f,2025-05-16T14:43:56.797000 -CVE-2025-47706,0,0,d40cdfcbb25ab76df54ebe49d0d1100af29fd6817507b2cb357524cfe9177e6c,2025-05-19T15:15:24.280000 -CVE-2025-47707,0,0,ea0353563aa3f594f8710ba5ac2ef85c343128f887d66da5826b92e66e7f13a2,2025-05-16T14:43:56.797000 -CVE-2025-47708,0,0,b46183ff90ad8011319bd811809b8dcc43906e688b5b61113c48b937e14fc71c,2025-05-20T17:15:49.700000 -CVE-2025-47709,0,0,9c00b271893f53d1f52294cb240e92548326ebdfcea3825170f6a366a64bc3e2,2025-05-19T15:15:24.443000 +CVE-2025-47702,0,1,a989ec3cf356a477dab297d584cb413674919d611ac0372fbeca97fe33e87bbe,2025-06-10T15:40:02.907000 +CVE-2025-47703,0,1,9b7415cec8b07e808e5a68f077b8c28608e9fa4f3f7b422fce5ed2e144155885,2025-06-10T15:39:25.567000 +CVE-2025-47704,0,1,8a91908fc0c94ff1ab81955ec33f4a7346553d022a35fd85e959604aa7fe8468,2025-06-10T15:32:53.443000 +CVE-2025-47705,0,1,3b0e1294458b02acdd63bcdb3e56084417c28c00d31b71cd2890a969131cbf6b,2025-06-10T15:30:59.653000 +CVE-2025-47706,0,1,c79c954fe432f320b3a0acc8a7ef92f4c0f44a24b44f4d8eb20934a6804b300d,2025-06-10T15:26:04.277000 +CVE-2025-47707,0,1,0c78846593c08e49bb05be49b5024045fb1d59332410efe4f8a49ed2d2651247,2025-06-10T15:25:56.740000 +CVE-2025-47708,0,1,84f05d4a302a4773233675624c12b096f71fa663eb5c771972565720cb29139c,2025-06-10T15:25:51.580000 +CVE-2025-47709,0,1,052096cd42f6144c5123d7b7b921bc47fc81175fe40fa776700da2bce1a0374e,2025-06-10T15:25:41.087000 CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d346e,2025-05-21T14:16:02.380000 -CVE-2025-47710,0,0,3861e04e9e65074d020efa7dab9e00a25ecb80cf10fb272d3ea074fb3b627c14,2025-05-19T15:15:24.580000 +CVE-2025-47710,0,1,efb080a2ca87d31fc53e84646807eb619dd8ffb84063c97064b1c37508c6b60a,2025-06-10T15:24:50.570000 CVE-2025-47711,0,0,84134213c5152e1def5667fee36ba3a5b2be995d24d7708c58e002afb898ec35,2025-06-09T12:15:47.880000 CVE-2025-47712,0,0,36ab066e163c4ffc449059531315de23291a62b1378074f34cd0681da81a794c,2025-06-09T12:15:47.880000 CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000 @@ -295878,7 +295890,7 @@ CVE-2025-47733,0,0,8ca49357b50ecb80722b97ab3f7e121e8dcb83e490a4a143991ae1fbc243a CVE-2025-47735,0,0,2f52e7c2d058d86629cac68f734c0774cf880fe4e8f98eedcaeede1d23aa6eff,2025-05-12T17:32:52.810000 CVE-2025-47736,0,0,2f11e9b0a9d748da2f6ce9c62d30862cdd6596c7ac96ac5f1028db67479c00c6,2025-05-12T17:32:52.810000 CVE-2025-47737,0,0,60cb12bc89ce6f2a8fe9e7af3463c6e9c2bcca5ef96322a90d7cccb126b389d1,2025-05-12T17:32:52.810000 -CVE-2025-4774,1,1,1e75afc071802c869ba75e3e2c7fee49a6dc26e98ae9abafaae710b45ad59a5a,2025-06-10T12:15:24.917000 +CVE-2025-4774,0,0,1e75afc071802c869ba75e3e2c7fee49a6dc26e98ae9abafaae710b45ad59a5a,2025-06-10T12:15:24.917000 CVE-2025-47748,0,0,6d3db12d37c958bc3ed0c3a8085a815af32d574707d63e9cde8e957a0c1f87c1,2025-05-30T17:15:29.117000 CVE-2025-47749,0,0,77136f5a200eae36103a9c78079b2abf4fa9dbee2a99746a355de3498002722c,2025-05-19T17:30:06.440000 CVE-2025-47750,0,0,1a4ff5a2f7fb0cd15d257d686f97e3b073753ad3ba8037a1d7327a6c86b11820,2025-05-19T17:31:27.667000 @@ -295931,7 +295943,7 @@ CVE-2025-47815,0,0,8632f47d917ef5d0fa860991936749fefdd362e688d75c65c324061519adf CVE-2025-47816,0,0,dfc656b734ddc613569bffc853fd450ab3517aaf74cbf8b07d633a1866015974,2025-05-12T19:15:51.733000 CVE-2025-47817,0,0,a9608fe19de2055ccc53db5d916ab7446a11a0159ceb8cb3f751e656accab718,2025-05-12T17:32:32.760000 CVE-2025-4782,0,0,7ad1545eb9e016317ccf1371b442ca29cb62e72aa504ad708f7f276790913468,2025-05-23T13:04:40.253000 -CVE-2025-47827,0,0,5e2f84bcb49ed4206de9cb88e83317953c756f84a7e161a3aa35e3d2c8c1fdef,2025-06-05T20:12:23.777000 +CVE-2025-47827,0,1,e8e7d1db0126d69a3b1ce4ce3cd4a43b2b63ba3f83e4b78ec9433a4d6806ed2f,2025-06-10T15:15:25.270000 CVE-2025-47828,0,0,164436fe84b8d833a71f3fa8e7f3f39b64e2df889f4579512ca4cd1f99b4e769,2025-05-12T17:32:32.760000 CVE-2025-4783,0,0,bd5695c741cd6c06c07a958617e5fade1eea7d7c38bb9f2f382e0e33491cd176,2025-05-28T15:01:30.720000 CVE-2025-4785,0,0,11af03bace6c1c04331c5dddb8e99f128f61109ba1a035e35492e3dbcae57560,2025-05-21T21:00:19.110000 @@ -295999,10 +296011,10 @@ CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108 CVE-2025-47966,0,0,9af6a33a751a4e930e5be1495300477ca1b17cde2c86ba4e4a2e9e219bcd8d40,2025-06-06T14:07:28.330000 CVE-2025-4797,0,0,7955c65d02ae59cf8e91f669d1ef33f935d7dc4278caacac2c860c6a07f32d1d,2025-06-04T14:54:33.783000 CVE-2025-4800,0,0,9318c6df70d36b773d7fc889153c4ccced0bd2fc6ace455b4d54f9e1c185a4a9,2025-05-28T15:01:30.720000 -CVE-2025-48009,0,0,f2f593603a23342f1ed10e6e06b800747a948e9a47401b873fcb7b9febb49dba,2025-05-21T20:24:58.133000 -CVE-2025-48010,0,0,29ecfb7056487f862ce3f3d52a72af1a1c7498499e974227523a3feeadf25999,2025-05-21T20:24:58.133000 -CVE-2025-48011,0,0,f7a7d415ad80812a779b1090cc64c6da9309fa4d9b5980d621fc83dfabfec97d,2025-05-21T20:24:58.133000 -CVE-2025-48012,0,0,df9423b6fbf39a2a6870d3c42514e16e314edbe3201f4776a251797001ce278c,2025-05-21T20:24:58.133000 +CVE-2025-48009,0,1,9bbf54dd866dd4de365cacd3cc58cc80c0cc2d2ba8fbdc821eac253715a62cf9,2025-06-10T15:29:32.900000 +CVE-2025-48010,0,1,4819d2e93ad3442257f70fb7864093e1a4200a7b0a7fba4a346e3f36d3da9e5b,2025-06-10T14:13:51.267000 +CVE-2025-48011,0,1,258b9fec7bb0d96eb7155a40013213737fe713d9c9fbe682bbd078d999f91910,2025-06-10T14:28:15.027000 +CVE-2025-48012,0,1,71d63bd70525687602bc234fe1b79ef8d4a14328f61a484c736f611a8ad14409,2025-06-10T14:28:52.893000 CVE-2025-48014,0,0,b9d2079ba78dd708b6501c98bcfc8c530a41a6a42eec8a9e644487633db1d02d,2025-05-21T20:24:58.133000 CVE-2025-48015,0,0,97195b1375e738b78c3c892de114d387c5901e8ee163a174bd7cc7d86bb801d6,2025-05-21T20:24:58.133000 CVE-2025-48016,0,0,7f338d05ff0bf5457b003e53823b639de05c7abe792c9baaaefb3f53dc116634,2025-05-21T20:24:58.133000 @@ -296224,8 +296236,8 @@ CVE-2025-4844,0,0,c912eb5a20c5346c9f6d6c3e57f91f3a367b50a9f461c9f08439baff48bc8f CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000 CVE-2025-4846,0,0,4dd97835f28bce0c2a0646c496f88035dc9f48717c734fc8fd3222164cab7575,2025-05-19T13:35:20.460000 CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000 -CVE-2025-48471,0,0,588fee2e8dfe1a788c861ba5dc9d42eb8680c8955f4aa532d6a4e45936ad62be,2025-05-30T16:31:03.107000 -CVE-2025-48472,0,0,934bb319d2253e00597f7f58fb2773ef535264083ba8f3e7595322894562221c,2025-05-30T16:31:03.107000 +CVE-2025-48471,0,1,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000 +CVE-2025-48472,0,1,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000 CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000 CVE-2025-48474,0,0,1b5617c927a4f3203821f0dae9b4591ef13d03a77e55a9eff2602e8bb0d7cb05,2025-05-30T16:31:03.107000 CVE-2025-48475,0,0,cc221468e2c81c464bbeb608aef3bd329a5e19afcff977fed2ff2390befd44f5,2025-05-30T16:31:03.107000 @@ -296451,7 +296463,7 @@ CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655 CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000 CVE-2025-49130,0,0,101994697265c4124b21893e7018192e4caf4f2ec31625a5dfcbe146cdb28e2a,2025-06-09T13:15:23.977000 CVE-2025-49131,0,0,cb5b50180e5eaa5b85e2d41a2bea84c06691db09851c0931186c9857c00a2951,2025-06-09T13:15:24.120000 -CVE-2025-49136,0,0,a10f25f5128caef6daafaa11ff5ce0b9bbb7807cdd2e862d107de1f6e8a0f6e5,2025-06-09T17:15:29.917000 +CVE-2025-49136,0,1,f17c65c3fffc31c312f66268030c86b49b3a7486baa9ae080bc38b145e145f89,2025-06-10T14:15:30.510000 CVE-2025-49137,0,0,4a9bc70d2fa871bf4605433ea43fb5042c491536b67aeba8f2381a10a42a4d8a,2025-06-09T21:15:46.890000 CVE-2025-49138,0,0,afec9b8853bb09177fbd685c5c96dfab6c791e5562e74f32f9c30e5ddd13eaf3,2025-06-09T21:15:47.047000 CVE-2025-49139,0,0,298d2b55fe3f58702c8a8336073404abfb72895885d946c55a5eec2f31d44687,2025-06-09T21:15:47.203000 @@ -296586,17 +296598,17 @@ CVE-2025-49449,0,0,cb55c78573e475586bf5898df8e2e4f1b569914e0d162e1db1433500aa43a CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000 CVE-2025-49450,0,0,fb4f52dbcabe6d10a7029fe4e63b7637345c171e5ff856e151d99f1496446ba0,2025-06-06T14:06:58.193000 CVE-2025-49453,0,0,66b7e122d30d583eff84e0f9157cb5663586cb3b5d97be1749136fd19a39911b,2025-06-06T14:06:58.193000 -CVE-2025-49454,1,1,2433f7f8de0001ca2d2da6c54dc979f31dcf2d414e8300db8b62359b19da3345,2025-06-10T13:15:22.733000 -CVE-2025-49455,1,1,9a47f583a263d3e3186cf1ae35041291e53c027322199aab4d219fcdcc74ab9a,2025-06-10T13:15:23.107000 +CVE-2025-49454,0,0,2433f7f8de0001ca2d2da6c54dc979f31dcf2d414e8300db8b62359b19da3345,2025-06-10T13:15:22.733000 +CVE-2025-49455,0,0,9a47f583a263d3e3186cf1ae35041291e53c027322199aab4d219fcdcc74ab9a,2025-06-10T13:15:23.107000 CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f115,2025-06-05T20:12:23.777000 CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000 CVE-2025-4948,0,0,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000 CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000 -CVE-2025-49507,1,1,24312343f4e2c01b89d0c4e095f704954733d42a1386c6354cb85aa7eb38383f,2025-06-10T13:15:23.283000 -CVE-2025-49509,1,1,1518f93f1ee224f1f100bcee71d6ba948043b73035e7eb346a997192f9c2edc4,2025-06-10T13:15:23.427000 +CVE-2025-49507,0,0,24312343f4e2c01b89d0c4e095f704954733d42a1386c6354cb85aa7eb38383f,2025-06-10T13:15:23.283000 +CVE-2025-49509,0,0,1518f93f1ee224f1f100bcee71d6ba948043b73035e7eb346a997192f9c2edc4,2025-06-10T13:15:23.427000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 -CVE-2025-49510,1,1,380506e2ae8c03ebf1a0d58576260eadb6379c51baddcca2c48765ccd61fe5a4,2025-06-10T13:15:23.583000 -CVE-2025-49511,1,1,89f9e9e06a92ee36a7fcee42b322bef8df2556399087804f516e0b0f17a65447,2025-06-10T13:15:23.747000 +CVE-2025-49510,0,0,380506e2ae8c03ebf1a0d58576260eadb6379c51baddcca2c48765ccd61fe5a4,2025-06-10T13:15:23.583000 +CVE-2025-49511,0,0,89f9e9e06a92ee36a7fcee42b322bef8df2556399087804f516e0b0f17a65447,2025-06-10T13:15:23.747000 CVE-2025-4954,0,0,4f8b18e50e35fbfc0cb799c772c703df1c5ec3452b90f5bc7c961ccbbcb5c026,2025-06-10T06:15:22.403000 CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000 CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000 @@ -296788,13 +296800,13 @@ CVE-2025-5222,0,0,f80b4651006f76581a0f11e89a1589708b41e90d125505313b9f47c7110032 CVE-2025-5223,0,0,eedcac5c929aac409f34f81cc2ec2de352a7f5b73ed89921b6a7fb323152d259,2025-06-07T23:15:22.067000 CVE-2025-5224,0,0,fe1dde8170826294eeb006cd262e5a7be588d2b4007cd87274f687b8957160b1,2025-05-28T20:46:50.577000 CVE-2025-5225,0,0,e0f7a8aba15fff895101b090456eaee855f3c175e14c6b8dc2047e796322aa04,2025-05-28T20:38:39.167000 -CVE-2025-5226,0,0,980540ab1b1d279e62959a4ba73d7e24cf3246c85b025673be4e06737ce5ba1c,2025-05-28T15:01:30.720000 -CVE-2025-5227,0,0,13dd55b4448d40752dd678f0fa5fc89e4aca16f28e7ababcc4afd721b7c19f53,2025-05-28T15:01:30.720000 +CVE-2025-5226,0,1,3f035f3ce096bd756bac1d05f7e172c640275b7f8d3eabff140993a51318bbdb,2025-06-10T15:43:41.087000 +CVE-2025-5227,0,1,bd9288f69602569aaf5c7c343359a30334456bbbf73bb80e888779abc798953e,2025-06-10T15:43:19.837000 CVE-2025-5228,0,0,3a0e12218f95d959eba2cefb6ecb66602ccc213d47caf3fc54f472a731c4f49e,2025-05-28T15:01:30.720000 CVE-2025-5229,0,0,1288da6b330c7645f72b24c3f896b277f2be20982fe0d52f419898332e513b8d,2025-05-28T20:38:08.080000 -CVE-2025-5230,0,0,2e235dbf1898f28539b100da4a6a6a412aca322bb268e421abadd01be2777514,2025-05-28T15:01:30.720000 -CVE-2025-5231,0,0,951eb3def93e595a6ef6cc052784501e9d6d9beba0f97ae7417df8cb11736a4e,2025-05-28T15:01:30.720000 -CVE-2025-5232,0,0,94f780db8b43929a33d0ebce8e4a0421854097c69daa52f40cf1b8be5db5d176,2025-05-28T15:01:30.720000 +CVE-2025-5230,0,1,9fadea541076e74f479fb5b5289a700110bb92230bc9a76add28f6c782b2ab5a,2025-06-10T15:11:44.053000 +CVE-2025-5231,0,1,933bca2cb9baedec07e689266f247371c054ab08b67bfc89de515eda8b6db129,2025-06-10T15:11:56.957000 +CVE-2025-5232,0,1,1b45026e75247a7322427bb058f27ed5717a2e44e9ed2a15532ca07a8f6c71a6,2025-06-10T15:12:09.197000 CVE-2025-5235,0,0,9f99135aac66ddf72cbc0dbdd83c4db7648e86e689f203314291273a812d09e8,2025-06-04T18:29:21.090000 CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c09a,2025-06-04T18:30:22.220000 CVE-2025-5239,0,0,7898c1e396cfbf8baf8b107169103de7dd241d1dc63468b7841c136fc0bb5fc9,2025-06-06T14:06:58.193000 @@ -296803,10 +296815,10 @@ CVE-2025-5244,0,0,f16a7ad73436a8b188ea427e076cb6d66c3866f0d06770cfebf2ea7a2f86cb CVE-2025-5245,0,0,76dfb770c29fdb4cddbdbfbfa1fee59cf2a7272fa687dfaa6e702792fcfc63df,2025-05-28T15:01:30.720000 CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e82,2025-05-28T20:38:00.033000 CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000 -CVE-2025-5248,0,0,354fd11447bc9fe4034996bca17e9d4af33bf34fe37dc0c74b25b8724779b601,2025-05-28T15:01:30.720000 +CVE-2025-5248,0,1,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000 CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b76,2025-05-28T15:01:30.720000 -CVE-2025-5250,0,0,dcd6edbc7cb845dfb15b14bc09cddc26e98b0f3af5b9bd34a6caeb449702d2fd,2025-05-28T15:01:30.720000 -CVE-2025-5251,0,0,c92bc64cbc5c80d1395afd727d86f0210c965e62a95faeaea45803d46499e451,2025-05-28T15:01:30.720000 +CVE-2025-5250,0,1,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000 +CVE-2025-5251,0,1,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000 CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000 CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000 CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000 @@ -296838,7 +296850,7 @@ CVE-2025-5292,0,0,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b CVE-2025-5295,0,0,86992e97da5db3e66123dc758ac5a1f83b74ab998ea61bbd2f95d3d081833d3f,2025-05-28T15:01:30.720000 CVE-2025-5297,0,0,87f5c2ea55786c8b81963baa725b45d00523179cb7524fec69b00cb83e8c752e,2025-05-28T15:01:30.720000 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 -CVE-2025-5299,0,0,2c75e790822eb43ea8892b1d4769ffefef855c8d85079d6be37a9a0e02c6ddb1,2025-05-28T15:01:30.720000 +CVE-2025-5299,0,1,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000 CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000 CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000 CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a15a,2025-06-01T05:15:19.883000 @@ -296847,18 +296859,20 @@ CVE-2025-5323,0,0,b0785ba87cd1215b18904af4ecc0dec4461f38599fcb91263ef5f63563e48a CVE-2025-5324,0,0,78e349d2bd14065297b1365314e2e0d4a2b731776a4275b89f97d27f39ee4fa3,2025-05-30T16:31:03.107000 CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a2d,2025-05-30T16:31:03.107000 CVE-2025-5326,0,0,44e560162f190407a031d43fb109d883b338df688e809a58566da260b71fd2ba,2025-05-30T16:31:03.107000 -CVE-2025-5327,0,0,c122b41cd4784d743ae12bd66678d79115777b161337566718924549ff9d5ace,2025-05-30T16:31:03.107000 -CVE-2025-5328,0,0,417fcf6f51b727567848f3720a3768648afbb392d247fa240c0094835655e393,2025-05-30T16:31:03.107000 +CVE-2025-5327,0,1,a8b880c32053a31de283f5a9cad582c296c544f77211624787db5b92e0d637e7,2025-06-10T15:13:37.533000 +CVE-2025-5328,0,1,69e2dcbfc2b85f6314db4745b576ea63b045f3b89808be8d33ed6e2b70669005,2025-06-10T15:14:10.110000 CVE-2025-5330,0,0,d834ad4ad61a847f16cff13c2e41a3edc0634ba2b8cfe9a60897f96120871dc7,2025-05-30T16:31:03.107000 CVE-2025-5331,0,0,6d6e63e0f8a1a491f6a38b24f4a10f691f644991827baf7d50b9fb0e398065a6,2025-05-30T16:31:03.107000 CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000 CVE-2025-5334,0,0,6cefdf4a8a5fef2de01d101edb206c6f9ee44bc60680712426fe5d51666584f6,2025-06-09T18:15:27.170000 +CVE-2025-5335,1,1,e16a76200b950d2b5a9c6bf9a18e3f4a54d41ee72e847fe3e679465b4988f67d,2025-06-10T15:15:25.703000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 +CVE-2025-5353,1,1,57b899ca5d1a7adbac2d3ccae7c49e4694f41d8501e61d00875f34fa068c589c,2025-06-10T15:15:25.883000 CVE-2025-5356,0,0,d2223801ca567247b6cb0c5b7ef4a510c84f7151648945f3dcaaa1c30308362b,2025-06-02T17:32:17.397000 CVE-2025-5357,0,0,5ffac87c68c3d58819140208e19f32acf2a5d2446a9a83bf211e7c826fa75a53,2025-06-02T17:32:17.397000 -CVE-2025-5358,0,0,a571adceafdafc811f521f24b0330af92fa86d371ee0585eb9bd211008c5ed1d,2025-06-02T17:32:17.397000 -CVE-2025-5359,0,0,7a8f6dcf877628bd337b8ab2dabeb336b2618c3f523230568d00f0546df60b77,2025-06-02T17:32:17.397000 +CVE-2025-5358,0,1,8d1b1a598434ecad4f0ae411fcaa51446d90f020f8729fd93cc9901ead4d16c2,2025-06-10T15:14:21.980000 +CVE-2025-5359,0,1,fbaee83932976cabc2c375b7182ecd49a378426f554e3965400f3dd72ff93c16,2025-06-10T15:14:30.460000 CVE-2025-5360,0,0,f6f6f0a68bcc88f729faa5e7b6e62c265dbe0f87de895580450e0ebfdb395bd6,2025-06-03T15:35:19.237000 CVE-2025-5361,0,0,63ed55da0a8819c3072e9ae5cbf20f6ad96bd8fa3415071144a15d946aef0cb0,2025-06-03T15:35:09.950000 CVE-2025-5362,0,0,33b74730f9e7ac14985e93de797c2da60e582983293fbae692e330f50a44162c,2025-06-03T15:34:57.473000 @@ -296926,9 +296940,9 @@ CVE-2025-5439,0,0,3cf41ec943c23293f4dda106c2a9c964060d68097fffb17e42ce95be089b72 CVE-2025-5440,0,0,9fb3ee8b902bf4c82a55ea9cc309a96a9f5bc9b647e9bb2e28aea5dae7d84f37,2025-06-02T17:32:17.397000 CVE-2025-5441,0,0,ac74c7cc0f531f603ebba9c2bca9d48918e26d19fe5966f70f4992ef7f9dc14a,2025-06-02T17:32:17.397000 CVE-2025-5442,0,0,aff4e7dbcf6e16c07e1755fc79189c8c906002caae35c81216b58555f7942402,2025-06-02T17:32:17.397000 -CVE-2025-5443,0,0,d5d0b82969bf11c714f39e6c42d424b733ddc8bd47929ddba9bd0cb239ee6ac2,2025-06-02T17:32:17.397000 -CVE-2025-5444,0,0,ea6c0636dfee92671fcbe5fd9d2661a6e766c435ad916cee44dfb5b114ce02bc,2025-06-02T17:32:17.397000 -CVE-2025-5445,0,0,048fd814ef42199f053c2e82398be3c5147effcceabcbf3b1626ae84367b426b,2025-06-02T17:32:17.397000 +CVE-2025-5443,0,1,c979fc559b9753e7b8f3cea4a3591b3d21b403fd87a023a9ecde01c1efbe3d0f,2025-06-10T15:14:40.057000 +CVE-2025-5444,0,1,2bdd03d16168890a76d628b7e1ae67a954e89be452c722e478e2135aa0988d5e,2025-06-10T15:14:50.777000 +CVE-2025-5445,0,1,48ecb9ed962bffb0d51cf3a0f453cb2062332faabc3f4707bcde0f91fbc8a125,2025-06-10T15:15:02.610000 CVE-2025-5446,0,0,35d85a6b109786f1b24f687919ca0a0a29c0ef8c307735f4c4f3239f7042c652,2025-06-02T17:32:17.397000 CVE-2025-5447,0,0,3f0e18d04d97ed4b37df377d5a284b98bec607376a89ae1ee717f001b4c6401a,2025-06-02T17:32:17.397000 CVE-2025-5455,0,0,c1321d8b95e99a1a6b4bd58591f4d8f5ad84a8f09a18d929f7bc30e94a33953f,2025-06-02T17:32:17.397000 @@ -296978,30 +296992,30 @@ CVE-2025-5542,0,0,3ecc2ef85a02a09c9be7e6dbf30040d86ff640f6ba754495a5d8dbf30a0806 CVE-2025-5543,0,0,1ff545b0787bdb2f415332be5f3786ca673df4cb409c2ec190778560a2d9b13a,2025-06-06T18:47:47.150000 CVE-2025-5544,0,0,020a516e79a3f89efe59dfb651e1ec3f5e799cf4a3d54ccd47ef877829750c60,2025-06-04T14:54:33.783000 CVE-2025-5545,0,0,55d8baf56abe80fa22bd39010fb1f2dbeb1a08ed8d27592cbb4a9f836725943d,2025-06-09T15:04:45.830000 -CVE-2025-5546,0,0,c014aea6b5432f9ec15a4f9236a0abd58e7be7ace9bb9e49f7a344a566124468,2025-06-04T14:54:33.783000 +CVE-2025-5546,0,1,912de4b43dff5d841c903f41c5d0728817acd0fa07ff252e93bd502efe24d6d0,2025-06-10T15:15:55.460000 CVE-2025-5547,0,0,ad624e392a872fc040477ed96757114cbc2f98e534b38b49cf7cf171901251a1,2025-06-04T14:54:33.783000 CVE-2025-5548,0,0,590c16f8c57c95c6b0fc54003176d2c57cd3a4ed604f2d3d418aed1b64c7d579,2025-06-04T14:54:33.783000 CVE-2025-5549,0,0,4a87195804f85532846e2070b675494ebb2dc114b1e03afb9dda2a13b1a91926,2025-06-04T14:54:33.783000 CVE-2025-5550,0,0,9f0963c1f449efb521dbc7cafbe3062160aa7a84498a39a10845a57f133b036a,2025-06-04T14:54:33.783000 CVE-2025-5551,0,0,d4340840da64ad8e437c324f4c7e2e891a0f347f31a6bc79663bc7b670bf3136,2025-06-04T14:54:33.783000 CVE-2025-5552,0,0,abba3e275efaa9b5b15cd58a4bc700d0b47553fee7bf598a342bbbb38eb89632,2025-06-04T14:54:33.783000 -CVE-2025-5553,0,0,f3a9e2bdcd04228f1abb8a03e479f9ca9155c875a12895a18cbb075d8067ecc6,2025-06-04T14:54:33.783000 -CVE-2025-5554,0,0,c2b5d14ea4feb40fe0081b98593638488f4ce059503a2bacd77de7b066d1bc3c,2025-06-04T14:54:33.783000 -CVE-2025-5556,0,0,1fc10a984c70e679e25f17dcf6d80db48358ad8ee2433e0b0867b4c050db4490,2025-06-04T14:54:33.783000 -CVE-2025-5557,0,0,367c267bc05d65b6a1a2399325fc46c9d81333e3642cdbb7198b85452213d8de,2025-06-04T14:54:33.783000 -CVE-2025-5558,0,0,2ac6d8dec4afd7e15c38ca1bcadede5871807c94fd2187d1936fb3e8f723e22b,2025-06-04T14:54:33.783000 -CVE-2025-5560,0,0,9af623a67baf1975e1c266a9dd2b23fb673ba32b97484cf97dfcbc25c8056283,2025-06-04T14:54:33.783000 -CVE-2025-5561,0,0,89bf58530abc9290057be65b322800672f7156f0149b4511ecbae6f44f339e6b,2025-06-04T14:54:33.783000 -CVE-2025-5562,0,0,343add22f2528d1ab365d74b6c653aeb153b343601b0ebacf12124363f3af2da,2025-06-04T14:54:33.783000 +CVE-2025-5553,0,1,fe4c614ffbe08afefea4288d466eb90eee97d4e2f16090dab1d687305d5627f3,2025-06-10T15:16:07.670000 +CVE-2025-5554,0,1,bb973700fe34126bf117ec751e38d204eccbaefe0d39d643366a25cffb57f45d,2025-06-10T15:16:16.877000 +CVE-2025-5556,0,1,1f63a7f5a7a91cd0b5f15f9dd5246b4bb97c1dcec71534f8a57046e817922924,2025-06-10T15:16:25.960000 +CVE-2025-5557,0,1,fd128465c0bc90cacbb5b3b2d601b7eb1c9da01523b98b89dfee1d497f1d2b1a,2025-06-10T15:16:34.460000 +CVE-2025-5558,0,1,8898e8aec84c9da1e1a971bfb5f9893e56cc9688fb9183de0f88cf551a2dfd4a,2025-06-10T15:16:47.660000 +CVE-2025-5560,0,1,21018256a4a41226bbfdbee889a1ff65b3ac04e2a1b78f1fe7522235e9af56b5,2025-06-10T15:10:58.590000 +CVE-2025-5561,0,1,37d583178eab41cfcaf572a9f55ac9ee56d529a81129a4bd0f0e52ba8e1b98bf,2025-06-10T15:10:51.040000 +CVE-2025-5562,0,1,6240bc0a7dbaa1de6ee01e8085c281ab501398cc54d049e3ba52ef12d9151257,2025-06-10T15:10:36.680000 CVE-2025-5563,0,0,abd05332a66da82c0a84bbcebb55ce866c616ee358de4033b1bc944eee92c5bd,2025-06-06T14:07:28.330000 CVE-2025-5565,0,0,69057d9fcda3a9d391a6fdd2d36028e43e46d962e75d2a96d0e0e06e8f6deb95,2025-06-06T14:07:28.330000 -CVE-2025-5566,0,0,6cd1b19db0a2abdf35ae21538de449c05d1cecfb40c37f0b82d89c2ca9b4dcf9,2025-06-04T14:54:33.783000 +CVE-2025-5566,0,1,779c860a161eb64dc6f40dd7f0ca399f4546b6e4ee22bf38748c51ae144c439c,2025-06-10T15:10:27.370000 CVE-2025-5568,0,0,3985b2b3c56041cfacfc47ea29b5076a771839690445a0941918b66a37c31945,2025-06-09T12:15:47.880000 CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000 CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000 CVE-2025-5572,0,0,f58a8b0d677b3b1e3374f5b4bd151cd210da95aa5b9dd2a74ae8e59ebb8e1e16,2025-06-06T18:48:37.333000 CVE-2025-5573,0,0,6e69e3f6614bb634486e032f3753cb8f537723c56a38d21eec74aa1f5111ea31,2025-06-06T18:48:46.463000 -CVE-2025-5574,0,0,d828c37825b04f9e6d6b2a7f019e3280cbd719b2e2fa72cc9964ddedc119f986,2025-06-04T14:54:33.783000 +CVE-2025-5574,0,1,7e7be3831b0299a7ae36546924c9d0572447f6adceed9e353cc4fce0d37f2ba9,2025-06-10T15:10:15.753000 CVE-2025-5575,0,0,81a126dfb6ccad488366b77c36606cd2156f744efbd821f36b71a3dcd92de139,2025-06-05T14:07:21.913000 CVE-2025-5576,0,0,9f8e91355100a3b7dd53af7604f262c00a18d00760bd7db63f9844a1c4222ed2,2025-06-04T18:28:36.393000 CVE-2025-5577,0,0,862bbaad6dfd6bc3941b913aa0d44c2f574c2a1c00c138cbc3600dc62caa3a63,2025-06-04T18:28:13.103000 @@ -297011,7 +297025,7 @@ CVE-2025-5580,0,0,5420af4803342beed15a14e9e13364c54154082896c2011e3016de8bff3b15 CVE-2025-5581,0,0,c54747d4f47de2d53a0450ac3d2803f6b1ce7f3a8f3dd0d32c7ea29ca0ea8be0,2025-06-04T17:44:44.413000 CVE-2025-5582,0,0,d2f1baa22f55fc38a8f865d0e99938121f7ce9bfb4e6584060e61c164943f9d6,2025-06-04T17:44:37.780000 CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991ad,2025-06-04T17:44:26.393000 -CVE-2025-5584,0,0,33fb5e30c150aff6fd49d9e5053812971ddea6fb06de04e2dfe2862137521fb0,2025-06-04T14:54:33.783000 +CVE-2025-5584,0,1,554122312ccf631b36ad0ef789707a593ded0bc038e2cac6c090436b66fd53f2,2025-06-10T15:10:06.207000 CVE-2025-5586,0,0,b91049de82efb55ef679cf10931aa4f56290c24a8f2fbf45be0281fcede07341,2025-06-06T14:07:28.330000 CVE-2025-5592,0,0,36c388f33c323490a93ebd79d5f124d5f4fdc10d946cc1144d6e587fb6694158,2025-06-09T15:02:45.030000 CVE-2025-5593,0,0,2fc870a522f11936dac0dea9ff39b04ab227f9c952baf080bcd9f5e32f30e2b0,2025-06-05T20:12:23.777000 @@ -297021,12 +297035,12 @@ CVE-2025-5596,0,0,82e23e549f21aaf09e5e1c4b088111b178830006f56637c5b165470eaca69f CVE-2025-5597,0,0,c6542e113819d36b9ca3595ae5f78250394d8b05f7ccd0ada2c6c9bddae0ce68,2025-06-04T14:54:33.783000 CVE-2025-5598,0,0,3e6053accb2ad1c62c474f119bb1ce64d7f1c5c7b880697e1b74f6ef86954e5b,2025-06-04T14:54:33.783000 CVE-2025-5599,0,0,a4690079a0136127df1bfec40ffa5cfbb791410519d82ad4cd23949e81f77301,2025-06-09T15:00:57.223000 -CVE-2025-5600,0,0,ec384cb6ecf5880516ee231f4ac4b03c216224af5eddf6c197e3e90b27c21c9a,2025-06-05T20:12:23.777000 +CVE-2025-5600,0,1,3624845bae8df5209c219f36d31448c60cec30dc60b6c9062ba78f3967c5b2b1,2025-06-10T15:09:46.277000 CVE-2025-5601,0,0,d110cb5e0e987f41c84d932ca577eb76fded00997009129ff3930d50ad06c883,2025-06-04T14:54:33.783000 -CVE-2025-5602,0,0,d31a0a832243a6c21ea6404356e93d5a8f62fce2d86889f5d30233438d9a91c1,2025-06-05T20:12:23.777000 -CVE-2025-5603,0,0,635481159a74434870eddacad9badd08fb7cf9ede57b452bab33a4e3cd508692,2025-06-05T20:12:23.777000 -CVE-2025-5604,0,0,d9ac32ed21ffa2e36351753287ff29a0b8fea123fb2ee29aa9fa3d9be38c40bd,2025-06-05T20:12:23.777000 -CVE-2025-5606,0,0,9ddabe61a83eacda33f6a44acbb9549de5e85870d39e6e28d65de37248401dda,2025-06-05T20:12:23.777000 +CVE-2025-5602,0,1,3b8e9fc3388759de747bb6bfe4645b24fa3f3dca6ebc49155b5fdf413e9b2781,2025-06-10T15:09:24.977000 +CVE-2025-5603,0,1,1ab3f9f1479cb59d22cc62b837b1e7a8cd1045a224053a34977c02df77d60d78,2025-06-10T15:09:11.080000 +CVE-2025-5604,0,1,b768114dbc74930cd913741feb177933cff26ecc0ccef0e633058f9d872da1ef,2025-06-10T15:08:53.860000 +CVE-2025-5606,0,1,f1b344f05593638f56ae97bd4a3ae2344d8c49f42a7e4146ae2f0ceba51d7ee8,2025-06-10T15:08:33.920000 CVE-2025-5607,0,0,9aacf7995f1e37d05e7f946c5a74b9cfa42ed1291e7d764cf1df8b98f4f8d919,2025-06-05T20:12:23.777000 CVE-2025-5608,0,0,a6fd4cf6a853c5b50d2adbc58badc00e78a4b15d719a0e262c3536cf7eb022e8,2025-06-05T20:12:23.777000 CVE-2025-5609,0,0,b393dc7d8eae58f3971e224e8813e7a1af64a0d88824f5f24af71e1ad3003ad7,2025-06-05T20:12:23.777000 @@ -297034,8 +297048,8 @@ CVE-2025-5610,0,0,082c2155c58bea98ca846c2b918c7a815670e7b62b90ea6043b1d833da38d9 CVE-2025-5611,0,0,504aec8c7f7af0281d744d783555468820a69c0d4453a0a1b4a3056c98992d92,2025-06-05T20:12:23.777000 CVE-2025-5612,0,0,3eb307a0a0cbaaa44e441a689cece0ed028d19cededc42a6e5128a2337fecf4d,2025-06-06T20:10:20.870000 CVE-2025-5613,0,0,5c852f790ee9450ec50beb9319d4075e185a01ce6ef26c1472484f137c74d219,2025-06-06T20:10:33.297000 -CVE-2025-5614,0,0,d09dea3c9e6a12e981e5f8161cf459a238c68b3ea3f4c9386fdf1113e2bafd4b,2025-06-05T20:12:23.777000 -CVE-2025-5615,0,0,4326e2289c0d7b24b7a09ee437c337198f41edb5c345b9f0cf5e696d7e5ae243,2025-06-05T20:12:23.777000 +CVE-2025-5614,0,1,8e0c0aa8d2812f5636529729017d80dc0e08b2225a3c38054accfc9540442377,2025-06-10T15:07:07.150000 +CVE-2025-5615,0,1,080a966a50aed58357dc4477fa8a1a1b759ccdf759ebc0bd9799539e94488994,2025-06-10T15:06:57.433000 CVE-2025-5616,0,0,bf665cc2d4d0a9f55a5dff0ef813aa4161535bf8ce07edeeec7e155263ff2ea4,2025-06-06T20:10:46.310000 CVE-2025-5617,0,0,9f49b3e5e465fa33b1a86264ece1f53de099c2ac8d84fd6abe55ccad00567710,2025-06-06T20:11:01.317000 CVE-2025-5618,0,0,dcda7ecbbd75b3aa7002c5dfea5bf8be5e01d44363a79aabe62f48ac2ecb882f,2025-06-06T20:11:48.340000 @@ -297051,9 +297065,9 @@ CVE-2025-5627,0,0,230727c373183a4548524000ad073fbb07ab9578e0b58e40e109af9720fe26 CVE-2025-5628,0,0,289ff0d0945b0397ab81c7390bb889742f4cd84bdef6d26ce6122dcbaa2d4c23,2025-06-06T15:20:23.697000 CVE-2025-5629,0,0,9bb41f96cfd049115e8fe7fb1b8f28e1ed189cfd4130e2ac263680cffaade3a3,2025-06-06T15:15:34.450000 CVE-2025-5630,0,0,c76d2d5d4cdbbcf3f1953926d8043d43083021367f405c5e508bb3be08905c5a,2025-06-06T15:15:04.173000 -CVE-2025-5631,0,0,bcfb580cbfb72951cc20082cc8035906190204ba8ef3f0021db9a2a662828a45,2025-06-05T20:12:23.777000 -CVE-2025-5632,0,0,df788376c6bc26316662273b4b20e68b87e977e6d901237ce9de63de085a0a6c,2025-06-05T20:12:23.777000 -CVE-2025-5633,0,0,1c4405ecef6e1e6034bf35254cd0848d53e0ce6c94976c7efa96a15c9c47ec68,2025-06-05T20:12:23.777000 +CVE-2025-5631,0,1,9520f1da612f67ba3cacb4f45328d86005130fcd40654c95da630bdfedd60c11,2025-06-10T15:06:48.390000 +CVE-2025-5632,0,1,8ad0fef869c4049544d603c15d429bacfd075475604feb92364d909438688e36,2025-06-10T15:06:36.483000 +CVE-2025-5633,0,1,3b0a21d83cf61d5b5f29a4ba5acd674d201048bb203557b600a037d42bc1f0dc,2025-06-10T15:06:27.257000 CVE-2025-5634,0,0,a8f7bce93769ae41367845b9305add4ff45e373670edfef278c3de8f80f971f4,2025-06-05T20:12:23.777000 CVE-2025-5635,0,0,d11431d595bac231f6760894b7a3d37b8c650b0446c79aadf9e50e72d833c28a,2025-06-05T20:12:23.777000 CVE-2025-5636,0,0,efbe4c23ccc8d989a2bf492b0f76a752acd7bc391b50e1f464d6882b7fb1548b,2025-06-05T20:12:23.777000 @@ -297069,19 +297083,19 @@ CVE-2025-5645,0,0,4709827fc4187848d80e03985eac7eeca7940fd2f1746e8979029ff17abfa1 CVE-2025-5646,0,0,2fff89e5f69774bf0290e16798e92cb561fb097e337cf23ea1fef978bc71b88a,2025-06-05T20:12:23.777000 CVE-2025-5647,0,0,04c0fa928fcb1a5c135d2ada655645cde50c394ce2a4307fd438db3c37aeef0e,2025-06-05T20:12:23.777000 CVE-2025-5648,0,0,96e93640f610667c70c48957a0d4bd5fc792d47f1dcc9dfd76ceecd1e0d80957,2025-06-05T20:12:23.777000 -CVE-2025-5649,0,0,448c5e556252feff63876eafed9d38c3b0932cf06a0db2fc26539e26dbe03cce,2025-06-05T20:12:23.777000 -CVE-2025-5650,0,0,87f3c3c120c063468fe229baab4f00edab29d85be2380535eae18ec0563c1f54,2025-06-05T20:12:23.777000 -CVE-2025-5651,0,0,6209ebc1ccd4a1f20f8cc371c1f66f629fc089e2785b3cc644626be9224d10b5,2025-06-05T20:12:23.777000 +CVE-2025-5649,0,1,8d1f3267e39f86a1983625a80d2b4086de30c2bb535ef4e2d4852137479dd55a,2025-06-10T15:05:56.120000 +CVE-2025-5650,0,1,c41210387d1002531a8860804a9f5e98813d1f3f1969221163975f35d5b4da41,2025-06-10T15:05:23.553000 +CVE-2025-5651,0,1,8e2ba335e9f679e1e13ecfad2970cda4293dff1df4ddceda19e1edcaba8ca630,2025-06-10T15:05:12.920000 CVE-2025-5652,0,0,0724d88b1f9ce21bc0e0832801cf9e7e7f74020843d83266b3b7dd809f5e6ba7,2025-06-06T18:31:53.513000 -CVE-2025-5653,0,0,d67f90066a64650fd07c71c53987fc320a100a4122fafd3c5ca0bf66911b12ac,2025-06-05T20:12:23.777000 -CVE-2025-5654,0,0,ac37000fc0a5c67183c860682e6cd76b640af07a5b604f1733acd7c742cb45bf,2025-06-05T20:12:23.777000 -CVE-2025-5655,0,0,0d0e81d708d4e5c3e35310162f70e9687943439e976750ed421c2cf3d3cf6a29,2025-06-05T20:12:23.777000 -CVE-2025-5656,0,0,5ab0dfd5eac6b051598855ee0c0f484fd750c7ce164470299b2100cb7c40a181,2025-06-05T20:12:23.777000 -CVE-2025-5657,0,0,9e332ef30ee6117f5e7ce2deefe86e1454a18b30e588530e6f579a92b8d13eb8,2025-06-05T20:12:23.777000 -CVE-2025-5658,0,0,7c4edfba5cac760f9dcdb78b99b7d36c29988f2c8898df730122297f7fe7ce17,2025-06-05T20:12:23.777000 +CVE-2025-5653,0,1,da755ba8339a98f5c3056c961e1098d96885507356387524c7f4efd0d31177f8,2025-06-10T15:05:01.687000 +CVE-2025-5654,0,1,aad7b406341fca3d2be283c7d4299523b9fa233ab63b2831170e20e228761ade,2025-06-10T15:04:45.870000 +CVE-2025-5655,0,1,131fe07f8fa27963687df1fc758ddb8b8d91c8d717ac28a37f70ed3c2fc60910,2025-06-10T15:02:37.133000 +CVE-2025-5656,0,1,3276fc083aa98f37e9b6a378e4791813d4ee484c57e5ac0c182774deb34fdd3b,2025-06-10T15:02:24.890000 +CVE-2025-5657,0,1,9a8b4caa2f505a19f56e020f35264a9f6906930cb113489e09f861441ab57f5f,2025-06-10T15:02:14.293000 +CVE-2025-5658,0,1,34516b29cf10eeba1bcf5853f6a1ed2cecd0392d82eb87eea008132056b82722,2025-06-10T15:02:02.407000 CVE-2025-5659,0,0,2e9f4a0e418de16bd3132ecd2481fb9b9879d63feb5400e7c03179d6af45fcfd,2025-06-06T18:42:31.650000 CVE-2025-5660,0,0,d49a54f32a97bad23440ace013a3dd27ada7eeb7c7e0a58f71ba52213e92aef2,2025-06-06T18:42:59.143000 -CVE-2025-5661,0,0,d22ede1b5ac8256ec11f7d4e6774547649cae66e79ef4dfbebc78f3483796d4f,2025-06-05T20:12:23.777000 +CVE-2025-5661,0,1,7e502153d7a836b77d682dac6d289f32a14d88d9c5aeae7159e1d1ad3f0abe74,2025-06-10T15:01:52.660000 CVE-2025-5663,0,0,8c93d873d2b9bcbc305e1d9b46e20f6f681f336f769ee36ddc277777629edd2b,2025-06-06T18:43:14.380000 CVE-2025-5664,0,0,30931b2c13042b11b7b60910daf38207426745862a59590cdb56b739bd04f24b,2025-06-05T20:12:23.777000 CVE-2025-5665,0,0,4af9267cc3c4d7515d0da96e1aabaa9d1714f2d5d087787bb7acb55bd95581eb,2025-06-05T20:12:23.777000 @@ -297099,12 +297113,12 @@ CVE-2025-5677,0,0,e1fd2dd1f7c92e781313ec950251f1d358d151486fbb0cb8bc3c7bf097d9eb CVE-2025-5679,0,0,39a76065dd3011f556df8ecc5c1607529488c249cbea269aa42dbb97296654d5,2025-06-05T20:12:23.777000 CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000 CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000 -CVE-2025-5685,0,0,41f30934d37a68c0b6e306b8453424d3ff8a24b4556b1bfb8e01e5aa7db29ca9,2025-06-06T16:15:29.510000 +CVE-2025-5685,0,1,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000 CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000 CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000 CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000 -CVE-2025-5693,0,0,45b4dce5b3908991629736e05f48dfc81521f9621e9157b8da0d80d3f76844f4,2025-06-06T14:07:28.330000 -CVE-2025-5694,0,0,066e1add7bcf3f93603691715622dc8fdbf50d29b4dc0fb7ab42eeb96709d921,2025-06-06T14:07:28.330000 +CVE-2025-5693,0,1,3eb6fccacf1bd20f2333db0bbaacd99059fce8b8a971e8a4304fa128bcdb0cb9,2025-06-10T15:01:27.903000 +CVE-2025-5694,0,1,903ae591483b4ac578a133192ea3d236171a92fe2d64e5248fd0b8468b1bbb6b,2025-06-10T15:01:17.830000 CVE-2025-5695,0,0,7094b4120ee2ce6d44d7f2cafe37e005429014ebc9c4db1ea27e4df48b79768f,2025-06-06T14:07:28.330000 CVE-2025-5696,0,0,b4091ee0fb4fa532c5f66065f45fdcbfe956ac564f6752fbce6c2f5c6e7f4f40,2025-06-06T14:07:28.330000 CVE-2025-5697,0,0,e16a3d80fb06f7ce0327380d6c48a4da47ce2498c4d874e03daa95c5a77d2485,2025-06-06T14:07:28.330000 @@ -297113,30 +297127,30 @@ CVE-2025-5699,0,0,0a1565e1ee571962b106c0d60bfe684a5661c8b79bdbf83ccaf5e242dffe56 CVE-2025-5701,0,0,873890d0d7ee46e4c64243a1f1cf0740948dafdadf78be33a983ccdb225e9602,2025-06-05T20:12:23.777000 CVE-2025-5702,0,0,f4b41a5876bf80125fd2f1b602bb755c8f57b5d1f34dfd56969670098c786271,2025-06-05T21:15:22.873000 CVE-2025-5703,0,0,94709a108b8c052e235b42f888b0029894770c90f72ee62feea2d3d3af8ba023,2025-06-06T14:07:28.330000 -CVE-2025-5704,0,0,d98aabdf818ab59c668dff5f45f824be63f5f339c81be2689c572eb1a1b3ec7f,2025-06-09T15:15:31.220000 -CVE-2025-5705,0,0,b581ba11137fbe615c94b76c817ab8fd6d75128324b57026b60aa2e59d28a371,2025-06-09T15:15:31.337000 -CVE-2025-5706,0,0,2a637c92dd5ad7ae5df8532e8a40f4b858348c2cc18d82a6ea468d08225d95be,2025-06-09T15:15:31.463000 -CVE-2025-5707,0,0,f547416b145eed5bda91133c1d8302c9d3f8650b4aab9b726fab47e5cfd789ca,2025-06-09T15:15:31.587000 -CVE-2025-5708,0,0,8de8521656905304dfdbcf40f8994971b61bf35bf7678977798204b3417046a9,2025-06-09T15:15:31.710000 -CVE-2025-5709,0,0,5d235ba6c1ef71981906332fc24710ef64ad527571be6e254cf11dba0efd5838,2025-06-09T15:15:31.840000 -CVE-2025-5710,0,0,d0d93ae402813d6909c783ad2e593151cdbc4aa548c44125e48c1202312781dc,2025-06-09T14:15:23.630000 -CVE-2025-5711,0,0,aede1ec0cfe39fe9ae30c997133be895c9343e51459469adb256824dca64c103,2025-06-09T14:15:23.757000 -CVE-2025-5712,0,0,0687d05b41a3e9fad407472a99dac1eaa7447d672f5678e4679af4a3c306bdab,2025-06-09T14:15:23.880000 +CVE-2025-5704,0,1,61fe4f717ffdd3e0bc072a12abde42d2539cecd476b9e983237a0d42ed39dc33,2025-06-10T15:01:10.223000 +CVE-2025-5705,0,1,8ff08853967923c427f10758ae4c72d50f3b210b4cfdb6cdf6fbd9f63adb1180,2025-06-10T15:00:58.353000 +CVE-2025-5706,0,1,9d7f0141a03d4502cbb4d4252bbc40c9de34ec797701479b234eabd5e8f45719,2025-06-10T15:00:39.853000 +CVE-2025-5707,0,1,03768732beb04d3dc090bc4628ded395b001fd130d28c1cae9e85e78d6c565e8,2025-06-10T15:00:28.237000 +CVE-2025-5708,0,1,285708e0c4c2d406128211f3ff463fc512ae1852a2098261d0842fc5090a27ba,2025-06-10T15:00:17.787000 +CVE-2025-5709,0,1,c194837df8957976fdf65b0a79b8ad4ab8ba025b71104af1ea83e4fe3936ff0d,2025-06-10T15:00:06.023000 +CVE-2025-5710,0,1,22d317274e29d58e8d0f080c3cbfb50424283196345fb5d5b671f6ecde0eba5b,2025-06-10T14:59:55.803000 +CVE-2025-5711,0,1,4e07d34f832c4a98bdc02eca84c69019cff401001befb4bad883e986f4062c5b,2025-06-10T14:59:46.313000 +CVE-2025-5712,0,1,cc03dc4f81a3344fe3967f9bdb8ddbd63656043638502f28d99f01c002367d7d,2025-06-10T15:46:43.267000 CVE-2025-5713,0,0,c84c8e527e1e1ce551be7423c38700a2e4568d28a15333ae5f635f2da6f31b6e,2025-06-09T14:15:24.137000 CVE-2025-5714,0,0,ff52588f054097f6df772f82bd45720edb355d0a72aec85dab4d3d114fcbcde3,2025-06-09T14:15:24.267000 CVE-2025-5715,0,0,7324db0938d9f10031910e863ebb33dc85accdfa4870fba818e50640ef364409,2025-06-09T14:15:24.393000 -CVE-2025-5716,0,0,cb8122d44ddde01181c6837445a0b88e09a978c83f9f5dc0e027ff062b6f62d4,2025-06-09T14:15:24.523000 +CVE-2025-5716,0,1,6a5127e87ccd7451fa359eddd1f1ca976ee41f17387602fe9c45af694962a531,2025-06-10T15:46:32.377000 CVE-2025-5719,0,0,d3af06b820cdad24cc8d7026b71cb63ac7f0ce0ec68aa1331bcfd408efaf53ba,2025-06-06T14:07:28.330000 -CVE-2025-5721,0,0,6370ce5dd80fb926963c033ab7797fdf3d148bc117cbaaa2da0f57a6c552fa5e,2025-06-09T14:15:24.697000 -CVE-2025-5722,0,0,45c4ac6e38c6709572a12b7ac0e3aced1b66764b47e85daa219f6b4b4e200dcb,2025-06-09T14:15:24.827000 -CVE-2025-5723,0,0,1dbc27f0625692dd3a29f8a8fa20851f2d087d68834582c2591c00b155cfe6d0,2025-06-09T14:15:24.950000 -CVE-2025-5724,0,0,d164067a0cca599ba709d7b13d2b1efb5e9c3e0f310814355e775163f815d3cf,2025-06-09T14:15:25.093000 -CVE-2025-5725,0,0,18001605ae4463c547e4e4c405ef7e66975325d9126453598f2c2b6817263fa1,2025-06-09T14:15:25.297000 +CVE-2025-5721,0,1,4ddda3f968a454880e1d4d2d60023785a79773dd304728c3bc99e6ee61607aec,2025-06-10T15:47:37.680000 +CVE-2025-5722,0,1,a7964efdc18e4bc1beb90ac824e1664e0c0a375d14ff32bc06365c8e32501d90,2025-06-10T14:59:17.903000 +CVE-2025-5723,0,1,11184ab3f208a19ce9c996ab3c00255c3f0c3b34e98627e17f79e3e19d7339cc,2025-06-10T14:59:02.027000 +CVE-2025-5724,0,1,b93d22dab9afa1f68385eee755304a67801f5b23d8977eabf56f075a28484c02,2025-06-10T14:58:46.713000 +CVE-2025-5725,0,1,50b90d1f6262d6199a4112ec7f62ca2f6a6af71fa34d8c551ddb2ea5f71b3cf8,2025-06-10T14:58:33.113000 CVE-2025-5726,0,0,617aad9a8853ccfe2921b474109c58f51a6c761fa5a93e6ced4980b6cc6fd3ae,2025-06-06T14:07:28.330000 CVE-2025-5727,0,0,eabd3f4195be577c366171af27add08fb1cbf3b0847e8c043b4505610ec7187e,2025-06-06T14:07:28.330000 -CVE-2025-5728,0,0,bdb800e5c9acbd8fb1a84895423d25a211d19f06f37d3aecc7ecd252156bef90,2025-06-09T14:15:25.427000 +CVE-2025-5728,0,1,a2734432c6d5c9718e73264aec800c40d10a3b1f503cc6a36bad0f61d236849e,2025-06-10T14:58:21.970000 CVE-2025-5729,0,0,e4496e2ef853aa19924d8ea59da09547edb389972468d1750a85a5b387d74db8,2025-06-09T13:15:24.277000 -CVE-2025-5732,0,0,88969f77f54957d4f211de83841dea80ff4e241209563aaaeb0430e1e1eb6fef,2025-06-09T13:15:24.430000 +CVE-2025-5732,0,1,e44c4abf488eb73f34cf4fc12053fa1034be5ba1cd633b45abb888bfd8cfede8,2025-06-10T14:58:00.633000 CVE-2025-5733,0,0,f9414f378c72883d276dec17aff75405246e3e34329518fe5887772f8c216d63,2025-06-06T14:07:28.330000 CVE-2025-5734,0,0,81db6ecaa2a330086e45d900f736563966e5de0eb1d315c7daba46bc2cd74caa,2025-06-06T14:07:28.330000 CVE-2025-5735,0,0,8d0103ffa8acdd7bdc427c0ade475eb00f65ea47ec4c25b162f49ca576d312ab,2025-06-06T14:07:28.330000 @@ -297154,26 +297168,26 @@ CVE-2025-5748,0,0,b761ade174b0cc8fcfa37b7bf22c809e0fbc46ef538ca5441f6bcf38746a2c CVE-2025-5749,0,0,2acdc5934ddc07f2fae85bef8a4374f26ddda9b56d85fb729428cb8631784aa0,2025-06-09T12:15:47.880000 CVE-2025-5750,0,0,646c631d9c514f468fff0f4160ac8169075fcfbd4ea661785f21ee9043cdb606,2025-06-09T12:15:47.880000 CVE-2025-5751,0,0,23d09c43fb68d6574ce1c145de5cc00dbd740af4044f3203a46a17e73c0d72a6,2025-06-09T12:15:47.880000 -CVE-2025-5755,0,0,28839a4284836d06b3eb4221f50b293458c660e12fcab8d4c7841bb6d8cb6c7a,2025-06-06T14:07:28.330000 +CVE-2025-5755,0,1,683d03a310dee20dfc4c0c492307fcdf50f379083e65a890885b5d7593fe9e0c,2025-06-10T15:46:20.973000 CVE-2025-5756,0,0,983cab85761c36f1e1ac2363ae99121e28a102ce2360578e9cd88c0e790262ab,2025-06-06T14:07:28.330000 CVE-2025-5757,0,0,135c18e20d949031e9ce20b6a79d8818b9e53edc58f52d0f7788e7c2403d1718,2025-06-06T14:07:28.330000 -CVE-2025-5758,0,0,f29f723e5a3da550f4080edb1d7359542867827286b043ad1c32cc4dd5f69f2d,2025-06-06T14:07:28.330000 -CVE-2025-5759,0,0,dda644c7f490148d22afc41f06dc0941a79053f9874e973d4213cd0c60d7fc97,2025-06-06T14:06:58.193000 +CVE-2025-5758,0,1,bce5afb4f21a287bf92575e93baec895e704f60501a807e104b04218775a5539,2025-06-10T15:46:05.007000 +CVE-2025-5759,0,1,dd26a21c310951f8c8cb21cdb2671617f7b1d86adbd58fa9e740fe83e3e4b93b,2025-06-10T14:57:42.917000 CVE-2025-5760,0,0,264b625ff0aed0d36bd2f34c00b500f47e8637a884732813c7f4bc5752a68537,2025-06-06T14:06:58.193000 -CVE-2025-5761,0,0,f5786efee122b17921e751eef8ca3015bb841de875d60b00e77a91a29ee98902,2025-06-06T14:06:58.193000 -CVE-2025-5762,0,0,3558c9e5da808cc793ac8fb6d0bec4c1b48aeb225c92a394cebb64ef1ddc114e,2025-06-09T13:15:24.880000 -CVE-2025-5763,0,0,41d604f04edc1938d5e800df8c1f25db77438e28ae6ae49e3894fa6f403a93d6,2025-06-09T13:15:25.010000 +CVE-2025-5761,0,1,6b08df0b4cbd80fdbb3f973140f0a6f8c80c4fba2be5f89a23b8b1009035568d,2025-06-10T14:57:30.623000 +CVE-2025-5762,0,1,98845990a3f86d908111d51ee73a3e155d48f6275d2246a68a11e0b27e9aa30f,2025-06-10T14:57:14.800000 +CVE-2025-5763,0,1,a15a3a2b0366b1c66dcf3b366b895c7439dfb4d30e432b0e7f8ed791e648add5,2025-06-10T14:55:49.067000 CVE-2025-5764,0,0,4f2c6876d92b5bb3c9e709af486cd2fb98e24b69cec52614390a76a0be759650,2025-06-06T14:06:58.193000 CVE-2025-5765,0,0,cc7be56634c2f62cd8fdc8fbbfe917fe4b28ac465d14d0ac5a2db8b97fa56654,2025-06-06T14:06:58.193000 CVE-2025-5766,0,0,3f1ef799b1969b022c2537aba595576f00ea36d744373bc3641b8077757e92ee,2025-06-06T14:06:58.193000 CVE-2025-5778,0,0,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000 CVE-2025-5779,0,0,9f50a78d552e33c5e0febe1891ee20155e9d5a17d0263584475829dac430dfc4,2025-06-09T12:15:47.880000 CVE-2025-5780,0,0,49469915e6c1514d41c901b198058eedaf34c45323a42d8f18373908581b8627,2025-06-09T13:15:25.197000 -CVE-2025-5782,0,0,92c856392f044da69dc51f834b132dd71b362afb8d05e85e4be798a860f00a4d,2025-06-09T12:15:47.880000 -CVE-2025-5783,0,0,891987bd26e30e447e51a21dc9523e6bd9b1ba7b621812594699957a487c7557,2025-06-09T12:15:47.880000 -CVE-2025-5784,0,0,9efa1c60b0afd29315382569b5130a6c14d594665647993cf840eb9168f3b013,2025-06-09T12:15:47.880000 -CVE-2025-5785,0,0,918791d7ee6ee54aa1d876c269bed5950ababc500ec42f2166dc4957a25cebde,2025-06-09T12:15:47.880000 -CVE-2025-5786,0,0,48789b9dd4e05beac94849b5d632581870b565cd2916f96bb4d09da7188e0843,2025-06-09T12:15:47.880000 +CVE-2025-5782,0,1,6972da12d61c944fe4bbea6f93b44a377d32b8a94e64404a2e1a04e310f27128,2025-06-10T15:42:31.557000 +CVE-2025-5783,0,1,ad3b4fbba1e09b73bf21fedfd9854dfacbc53263d6cf28fde257534a31faeedc,2025-06-10T15:42:17.287000 +CVE-2025-5784,0,1,e09538ed3fb443c9b7bf4475803950b33e688b0670f3753325c659e87e3e11ff,2025-06-10T14:56:59.937000 +CVE-2025-5785,0,1,bed468c76f00e36e796a823df55cc8ba5b8001ab8cd4a0bc3ebd1b409037ea2f,2025-06-10T14:56:41.397000 +CVE-2025-5786,0,1,cba78e3d1605d0575de2eda7ef0114839aba755a1d173d5fef8167822e753f46,2025-06-10T14:56:32.553000 CVE-2025-5787,0,0,33fdb7d532b54bc886ec0cf9d76d17f2a503e91b7267fc08e8c1631a963666fb,2025-06-09T19:08:58.440000 CVE-2025-5788,0,0,5c9d545164898c3673eb6f06204dd5f33e9abe63ac09e547a32bdcf2699ef525,2025-06-09T19:08:51.570000 CVE-2025-5789,0,0,8b809b671f8113715e0d2812467dae263d8678ce3a42e39c50772fb525e79544,2025-06-09T19:08:42.200000 @@ -297191,9 +297205,9 @@ CVE-2025-5806,0,0,eced74af9a3bd847a96fe591b592713a189dcd85d66bd43936ab31bd4aa88a CVE-2025-5814,0,0,a167867f53c6fadb9d3db3d4ef4e109f1fea46d1abeb35216542db72110fa696,2025-06-09T12:15:47.880000 CVE-2025-5836,0,0,d80bb6457241c6112de58f50d5f8d524854cb0ce4d9b0e26a6df5eac567f78ac,2025-06-09T19:07:49.417000 CVE-2025-5837,0,0,85c1936a3a1142d6d72d779afcb63f2a00a18b124b5cff42b89badcdc2313d9c,2025-06-09T19:07:41.590000 -CVE-2025-5838,0,0,6cffed3ad5bb6ebc7a3a7d5185b54706bc29b5aa3d9892b7eda5ddeac376080c,2025-06-09T12:15:47.880000 +CVE-2025-5838,0,1,35626c7c8e1d04fa7bdba348c0108b2c123b4d5d313bbcf8d5dd0d6177716b08,2025-06-10T14:56:21.530000 CVE-2025-5839,0,0,af2c1c6da3fb5a22931f1ffebd67420dd5150792d38533d6eb8686e18f591276,2025-06-09T19:07:34.470000 -CVE-2025-5840,0,0,10bb467b9354ff51b445f469eb5368da8f75354a271fa217ae4179a9fdffa942,2025-06-09T12:15:47.880000 +CVE-2025-5840,0,1,a1906b279632ca933a71469d14d9b22734a373c8dc4ebaee1a55c4351d13760a,2025-06-10T15:45:31.043000 CVE-2025-5847,0,0,72a670a977f930c072e82981d9be0647255328c3124df63dafd15061a72168a9,2025-06-09T19:04:55.580000 CVE-2025-5848,0,0,97a77699d44911bbc0f7dbb24d5b37ad7d0974431c5e2858413f0642987e5a7c,2025-06-09T19:04:50.113000 CVE-2025-5849,0,0,0056fe9cb36cc640911c965de99076fd3871906072eb39fce82181a9d0f80791,2025-06-09T19:04:44.777000 @@ -297203,9 +297217,9 @@ CVE-2025-5852,0,0,0a2fdf4da0a01421d9fa71dc34f0132d5d6b40cb14bb02ddc73b60a3b1b65d CVE-2025-5853,0,0,3b7a3b76340110cb86de73e9a462cb084a25b4297584faeeda4076711dabaebd,2025-06-09T19:04:03.967000 CVE-2025-5854,0,0,273befbf12797584cc9facbf57feeb0f4f9cdcb1cb1ee1a8d5b09d5c3ad6a192,2025-06-09T19:03:46.770000 CVE-2025-5855,0,0,d5282fd79c1cadea7a65690d1ae6cb55cd80e999a15b0f7f5d35aa82bc524845,2025-06-09T19:03:39.630000 -CVE-2025-5856,0,0,5468a00e537c72311b8dc7c4dc2d6c78d33e8cd35ae1f0716866263232ae9bd5,2025-06-09T12:15:47.880000 +CVE-2025-5856,0,1,31b9f2d310454a1662adf314e490057e70c37b8d17c82c3f26fd322fd7e55f86,2025-06-10T14:56:12.723000 CVE-2025-5857,0,0,cfeb535dbe9bc7d8d6ebf4be16cdf2e4637ec03ad9f0cb2fa366af4a9836b331,2025-06-09T12:15:47.880000 -CVE-2025-5858,0,0,2228b11234fa5607ed2fb9c7b56c8ee7aec9f91091c296fd5d48b0f990f9dfc4,2025-06-09T12:15:47.880000 +CVE-2025-5858,0,1,3d6c23279016328dc507c63b7ac19e83b3b1b7a1766f7e389a1fd50c4b486a61,2025-06-10T14:55:58.620000 CVE-2025-5859,0,0,3424c8609b984051738702bad682f63bb4a253c66b33631b1110b9ea5c523815,2025-06-09T19:03:29.737000 CVE-2025-5860,0,0,98b6d02b7a56e80747f95a140e65963ddf24738288c1bbe6bf1fa28b310dece5,2025-06-09T19:03:16.047000 CVE-2025-5861,0,0,1431f1040bf1b34a1b2d7e2cdf36e30a25b9488675016843791967883e0eef12,2025-06-09T19:03:01.067000 @@ -297230,7 +297244,7 @@ CVE-2025-5880,0,0,391ef7c96b0d70d3c1236374a2bb4d81a37bc1b637881945e5debe7ba99a2f CVE-2025-5881,0,0,5eb4bf7442e35d74dc490267704b35dfdada119b0d68aea9f4cd8d5d2f28ed28,2025-06-09T14:15:27.503000 CVE-2025-5884,0,0,59f697ab8d23b519d31c72c30457b66f068a4c6df1e63f817cac6e20faedb5ca,2025-06-09T15:15:33.173000 CVE-2025-5885,0,0,bca2d2871b63dd6eccf4504f84b7c81750e56a52a9d6586fb746c58736eec613,2025-06-09T15:15:33.397000 -CVE-2025-5886,0,0,3dd8cdcb94f1f6e80498f862a3c97a457e1233fa195875fc3a15ee9021f274b4,2025-06-09T16:15:47.440000 +CVE-2025-5886,0,1,57f3fe000a27ba71a3c9ab8b5a9188dfe28750cdcdddec173aef81c271bb4a71,2025-06-10T14:15:31.160000 CVE-2025-5887,0,0,5136919542c2b0d6efd89daa4797cf9dc684ce484d0bee313edcf2d161ac9cfb,2025-06-09T20:15:25.013000 CVE-2025-5888,0,0,8ae86dc91bfbb19db8069a50148c81b6ef6ab94e58e8b25cf50a4393802ed91e,2025-06-09T18:15:27.873000 CVE-2025-5889,0,0,12866cc0cd082a7151f1e5bf29dd88d934d59269df384abc8b0144c010419bd3,2025-06-09T19:15:25.460000 @@ -297255,16 +297269,16 @@ CVE-2025-5907,0,0,5d329676c8670997ed9bbd9ec920c44010fa9710ac335febffe90162e564e1 CVE-2025-5908,0,0,37a781f179b1660861001bee4d6c7fb2b67dae046e6af7975b6ededfbac21b41,2025-06-10T01:15:24.167000 CVE-2025-5909,0,0,ab669f12f4fae3bd2f0735d7b1e7ccb7a4a13f9471f08d5428635b990107078e,2025-06-10T02:15:21.007000 CVE-2025-5910,0,0,715eda73591903f377a983344c94f5b98f27bef425aa0c6a6a65f0932e6208e0,2025-06-10T03:15:38.583000 -CVE-2025-5911,0,0,d7e3dcb7d9bb0675f96fabf6f38549f2456bb2d26953b2e2b03a3110da86f3a8,2025-06-10T03:15:39.060000 -CVE-2025-5912,0,1,fc829098fb36c572f42bd3ad43b84104ffd43f9edbc3a07bb8f8f65b641b7584,2025-06-10T13:15:24.117000 -CVE-2025-5913,0,1,f23d22995ace860f4eedc70184b3f124f503628f51322e84608328c1fe143107,2025-06-10T13:15:24.380000 +CVE-2025-5911,0,1,4ba655ae4b29dcb3761f35ad70f52e4de8492ae7a7e0f3e3df2623f260a76756,2025-06-10T14:15:31.300000 +CVE-2025-5912,0,0,fc829098fb36c572f42bd3ad43b84104ffd43f9edbc3a07bb8f8f65b641b7584,2025-06-10T13:15:24.117000 +CVE-2025-5913,0,0,f23d22995ace860f4eedc70184b3f124f503628f51322e84608328c1fe143107,2025-06-10T13:15:24.380000 CVE-2025-5914,0,0,ca2950efdb51e21bbb1b52a25d765df8575e0ffa29446d96c03c3ef2bb78c27f,2025-06-09T20:15:26.123000 CVE-2025-5915,0,0,0e67ccac333c7a11c03869b01cbfabaf1cb283cb5a64338a4f2ca5aab164415e,2025-06-09T20:15:26.317000 CVE-2025-5916,0,0,de33dac47619c4e1d912727e7eb0e9fccd9c7c67167013ac3aa335bd776c0a9e,2025-06-09T20:15:27.170000 CVE-2025-5917,0,0,479e3dcc90af3e8467020be4388f622f5adbb9e240dc38ecb4cf9119d478c05a,2025-06-09T20:15:27.330000 CVE-2025-5918,0,0,5fae4533f01b7c4f6585a87e7b2331625bf70aa585af023c3c09519081c4b2f9,2025-06-09T20:15:27.493000 CVE-2025-5925,0,0,573daaf55ea018a58bf2bd7e92cad13cf577779f7064f5ad7d1f8de96931b737,2025-06-10T04:15:54.330000 -CVE-2025-5934,0,1,6e6b56247e88c88b3883e91849581fe9fb4286ffb99dfd632c90d49eafeb498f,2025-06-10T13:15:24.570000 +CVE-2025-5934,0,0,6e6b56247e88c88b3883e91849581fe9fb4286ffb99dfd632c90d49eafeb498f,2025-06-10T13:15:24.570000 CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2cd,2025-06-10T05:15:22.780000 CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000 CVE-2025-5952,0,0,f3a4e649f505b0fd93baf65191971ffe21485a7c802124ab53f303aeb8bcf467,2025-06-10T05:15:23.023000