From e2bdcb404ad87ed7b1d2d55a3fedc3f415b35094 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 8 Jul 2025 04:03:48 +0000 Subject: [PATCH] Auto-Update: 2025-07-08T04:00:10.772413+00:00 --- CVE-2025/CVE-2025-206xx/CVE-2025-20680.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20681.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20682.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20683.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20684.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20685.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20686.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20687.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20688.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20689.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20690.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20691.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20692.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20693.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20694.json | 33 +++++ CVE-2025/CVE-2025-206xx/CVE-2025-20695.json | 33 +++++ CVE-2025/CVE-2025-536xx/CVE-2025-53610.json | 16 +++ CVE-2025/CVE-2025-536xx/CVE-2025-53611.json | 16 +++ CVE-2025/CVE-2025-536xx/CVE-2025-53612.json | 16 +++ CVE-2025/CVE-2025-536xx/CVE-2025-53613.json | 16 +++ CVE-2025/CVE-2025-536xx/CVE-2025-53614.json | 16 +++ CVE-2025/CVE-2025-536xx/CVE-2025-53615.json | 16 +++ CVE-2025/CVE-2025-536xx/CVE-2025-53616.json | 16 +++ CVE-2025/CVE-2025-536xx/CVE-2025-53617.json | 16 +++ CVE-2025/CVE-2025-55xx/CVE-2025-5570.json | 60 ++++++++ CVE-2025/CVE-2025-60xx/CVE-2025-6032.json | 14 +- CVE-2025/CVE-2025-62xx/CVE-2025-6244.json | 60 ++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7146.json | 104 ++++++++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7156.json | 141 +++++++++++++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7157.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7158.json | 145 ++++++++++++++++++++ CVE-2025/CVE-2025-71xx/CVE-2025-7159.json | 145 ++++++++++++++++++++ README.md | 63 ++++----- _state.csv | 103 +++++++++----- 34 files changed, 1566 insertions(+), 70 deletions(-) create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20680.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20681.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20682.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20683.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20684.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20685.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20686.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20687.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20688.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20689.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20690.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20691.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20692.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20693.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20694.json create mode 100644 CVE-2025/CVE-2025-206xx/CVE-2025-20695.json create mode 100644 CVE-2025/CVE-2025-536xx/CVE-2025-53610.json create mode 100644 CVE-2025/CVE-2025-536xx/CVE-2025-53611.json create mode 100644 CVE-2025/CVE-2025-536xx/CVE-2025-53612.json create mode 100644 CVE-2025/CVE-2025-536xx/CVE-2025-53613.json create mode 100644 CVE-2025/CVE-2025-536xx/CVE-2025-53614.json create mode 100644 CVE-2025/CVE-2025-536xx/CVE-2025-53615.json create mode 100644 CVE-2025/CVE-2025-536xx/CVE-2025-53616.json create mode 100644 CVE-2025/CVE-2025-536xx/CVE-2025-53617.json create mode 100644 CVE-2025/CVE-2025-55xx/CVE-2025-5570.json create mode 100644 CVE-2025/CVE-2025-62xx/CVE-2025-6244.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7146.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7156.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7157.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7158.json create mode 100644 CVE-2025/CVE-2025-71xx/CVE-2025-7159.json diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20680.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20680.json new file mode 100644 index 00000000000..737a42fa6a7 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20680.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20680", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:26.423", + "lastModified": "2025-07-08T03:15:26.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418044; Issue ID: MSV-3482." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20681.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20681.json new file mode 100644 index 00000000000..a3531367a82 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20681.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20681", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:27.260", + "lastModified": "2025-07-08T03:15:27.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416936; Issue ID: MSV-3446." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20682.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20682.json new file mode 100644 index 00000000000..971df9d492c --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20682.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20682", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:27.407", + "lastModified": "2025-07-08T03:15:27.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416937; Issue ID: MSV-3445." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20683.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20683.json new file mode 100644 index 00000000000..5dc870a999e --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20683.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20683", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:27.550", + "lastModified": "2025-07-08T03:15:27.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416938; Issue ID: MSV-3444." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20684.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20684.json new file mode 100644 index 00000000000..f9289baa012 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20684.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20684", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:27.690", + "lastModified": "2025-07-08T03:15:27.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416939; Issue ID: MSV-3422." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20685.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20685.json new file mode 100644 index 00000000000..dab8ffac638 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20685.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20685", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:27.833", + "lastModified": "2025-07-08T03:15:27.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416226; Issue ID: MSV-3409." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20686.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20686.json new file mode 100644 index 00000000000..b7e35ef036a --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20686.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20686", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:27.987", + "lastModified": "2025-07-08T03:15:27.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00415570; Issue ID: MSV-3404." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20687.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20687.json new file mode 100644 index 00000000000..615eece2841 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20687.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20687", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:28.143", + "lastModified": "2025-07-08T03:15:28.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Bluetooth driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418045; Issue ID: MSV-3481." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20688.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20688.json new file mode 100644 index 00000000000..6b59f9fcfbe --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20688.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20688", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:28.350", + "lastModified": "2025-07-08T03:15:28.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418047; Issue ID: MSV-3480." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20689.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20689.json new file mode 100644 index 00000000000..719f9f4a0aa --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20689.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20689", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:28.503", + "lastModified": "2025-07-08T03:15:28.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418048; Issue ID: MSV-3479." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20690.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20690.json new file mode 100644 index 00000000000..2a76c65829c --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20690.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20690", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:28.653", + "lastModified": "2025-07-08T03:15:28.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418038; Issue ID: MSV-3478." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20691.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20691.json new file mode 100644 index 00000000000..655a2c361e5 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20691.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20691", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:28.807", + "lastModified": "2025-07-08T03:15:28.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418039; Issue ID: MSV-3477." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20692.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20692.json new file mode 100644 index 00000000000..8a52dfc5363 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20692.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20692", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:28.950", + "lastModified": "2025-07-08T03:15:28.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418040; Issue ID: MSV-3476." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20693.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20693.json new file mode 100644 index 00000000000..b83f5050e91 --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20693.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20693", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:29.100", + "lastModified": "2025-07-08T03:15:29.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20694.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20694.json new file mode 100644 index 00000000000..76be8940b5f --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20694.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20694", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:29.250", + "lastModified": "2025-07-08T03:15:29.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Bluetooth FW, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09752821; Issue ID: MSV-3342." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-124" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20695.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20695.json new file mode 100644 index 00000000000..6d685ba728c --- /dev/null +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20695.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-20695", + "sourceIdentifier": "security@mediatek.com", + "published": "2025-07-08T03:15:29.433", + "lastModified": "2025-07-08T03:15:29.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Bluetooth FW, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09741871; Issue ID: MSV-3317." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-124" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/July-2025", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53610.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53610.json new file mode 100644 index 00000000000..fd4648f962a --- /dev/null +++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53610.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-53610", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-07-08T03:15:29.617", + "lastModified": "2025-07-08T03:15:29.617", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53611.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53611.json new file mode 100644 index 00000000000..f6f7da58268 --- /dev/null +++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53611.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-53611", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-07-08T03:15:29.727", + "lastModified": "2025-07-08T03:15:29.727", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53612.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53612.json new file mode 100644 index 00000000000..be51525779e --- /dev/null +++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53612.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-53612", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-07-08T03:15:29.810", + "lastModified": "2025-07-08T03:15:29.810", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53613.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53613.json new file mode 100644 index 00000000000..54a06dd43d4 --- /dev/null +++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53613.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-53613", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-07-08T03:15:29.913", + "lastModified": "2025-07-08T03:15:29.913", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53614.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53614.json new file mode 100644 index 00000000000..af1dc453f16 --- /dev/null +++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53614.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-53614", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-07-08T03:15:30.007", + "lastModified": "2025-07-08T03:15:30.007", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53615.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53615.json new file mode 100644 index 00000000000..d02e4e10ca7 --- /dev/null +++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53615.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-53615", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-07-08T03:15:30.117", + "lastModified": "2025-07-08T03:15:30.117", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53616.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53616.json new file mode 100644 index 00000000000..434a6a315be --- /dev/null +++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53616.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-53616", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-07-08T03:15:30.240", + "lastModified": "2025-07-08T03:15:30.240", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-536xx/CVE-2025-53617.json b/CVE-2025/CVE-2025-536xx/CVE-2025-53617.json new file mode 100644 index 00000000000..7ca87716024 --- /dev/null +++ b/CVE-2025/CVE-2025-536xx/CVE-2025-53617.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-53617", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-07-08T03:15:30.337", + "lastModified": "2025-07-08T03:15:30.337", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-55xx/CVE-2025-5570.json b/CVE-2025/CVE-2025-55xx/CVE-2025-5570.json new file mode 100644 index 00000000000..fb2f9067183 --- /dev/null +++ b/CVE-2025/CVE-2025-55xx/CVE-2025-5570.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-5570", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-07-08T03:15:30.423", + "lastModified": "2025-07-08T03:15:30.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The AI Engine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the mwai_chatbot shortcode 'id' parameter in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.8.2/classes/modules/chatbot.php#L617", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a32dcf96-ec75-46b1-8f1d-608411ad5147?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6032.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6032.json index e707657107b..8c7f6959cbe 100644 --- a/CVE-2025/CVE-2025-60xx/CVE-2025-6032.json +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6032.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6032", "sourceIdentifier": "secalert@redhat.com", "published": "2025-06-24T14:15:30.703", - "lastModified": "2025-07-02T08:15:57.507", + "lastModified": "2025-07-08T03:15:30.727", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,18 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:10549", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:10550", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:10551", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:9726", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-62xx/CVE-2025-6244.json b/CVE-2025/CVE-2025-62xx/CVE-2025-6244.json new file mode 100644 index 00000000000..da06aa7e4da --- /dev/null +++ b/CVE-2025/CVE-2025-62xx/CVE-2025-6244.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6244", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-07-08T03:15:30.947", + "lastModified": "2025-07-08T03:15:30.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Essential Addons for Elementor \u2013 Popular Elementor Templates and Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the via `Calendar` And `Business Reviews` Widgets attributes in all versions up to, and including, 6.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3318211/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/847a4fc7-3580-421e-8045-41b5a85f2d97?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7146.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7146.json new file mode 100644 index 00000000000..2acc94b3ccf --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7146.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-7146", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2025-07-08T02:15:22.367", + "lastModified": "2025-07-08T02:15:22.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The iPublish System developed by Jhenggao has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to read arbitrary system file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "twcert@cert.org.tw", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-10234-38665-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-10233-45fc8-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7156.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7156.json new file mode 100644 index 00000000000..2db108d8f1d --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7156.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-7156", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-08T02:15:22.580", + "lastModified": "2025-07-08T02:15:22.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in hitsz-ids airda 0.0.3 and classified as critical. This vulnerability affects the function execute of the file /v1/chat/completions. The manipulation of the argument question leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.315094", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315094", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.606352", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.cnblogs.com/aibot/p/18956966", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7157.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7157.json new file mode 100644 index 00000000000..185dcc8638e --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7157.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7157", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-08T03:15:31.123", + "lastModified": "2025-07-08T03:15:31.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Online Note Sharing 1.0. It has been classified as critical. Affected is an unknown function of the file /login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/yihaofuweng/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315096", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315096", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.606355", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7158.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7158.json new file mode 100644 index 00000000000..e7d31b86195 --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7158.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7158", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-08T03:15:31.373", + "lastModified": "2025-07-08T03:15:31.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/manage-normal-ticket.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/101", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315097", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315097", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.606365", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-71xx/CVE-2025-7159.json b/CVE-2025/CVE-2025-71xx/CVE-2025-7159.json new file mode 100644 index 00000000000..fb816f05673 --- /dev/null +++ b/CVE-2025/CVE-2025-71xx/CVE-2025-7159.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-7159", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-07-08T03:15:31.590", + "lastModified": "2025-07-08T03:15:31.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/manage-animals.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/102", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.315098", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.315098", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.606366", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ed637b596d3..26745d8a772 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-07-08T02:00:11.860634+00:00 +2025-07-08T04:00:10.772413+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-07-08T01:15:26.400000+00:00 +2025-07-08T03:15:31.590000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -300738 +300769 ``` ### CVEs added in the last Commit Recently added CVEs: `31` -- [CVE-2025-42961](CVE-2025/CVE-2025-429xx/CVE-2025-42961.json) (`2025-07-08T01:15:22.783`) -- [CVE-2025-42962](CVE-2025/CVE-2025-429xx/CVE-2025-42962.json) (`2025-07-08T01:15:22.937`) -- [CVE-2025-42963](CVE-2025/CVE-2025-429xx/CVE-2025-42963.json) (`2025-07-08T01:15:23.093`) -- [CVE-2025-42964](CVE-2025/CVE-2025-429xx/CVE-2025-42964.json) (`2025-07-08T01:15:23.240`) -- [CVE-2025-42965](CVE-2025/CVE-2025-429xx/CVE-2025-42965.json) (`2025-07-08T01:15:23.440`) -- [CVE-2025-42966](CVE-2025/CVE-2025-429xx/CVE-2025-42966.json) (`2025-07-08T01:15:23.630`) -- [CVE-2025-42967](CVE-2025/CVE-2025-429xx/CVE-2025-42967.json) (`2025-07-08T01:15:23.787`) -- [CVE-2025-42968](CVE-2025/CVE-2025-429xx/CVE-2025-42968.json) (`2025-07-08T01:15:23.950`) -- [CVE-2025-42969](CVE-2025/CVE-2025-429xx/CVE-2025-42969.json) (`2025-07-08T01:15:24.120`) -- [CVE-2025-42970](CVE-2025/CVE-2025-429xx/CVE-2025-42970.json) (`2025-07-08T01:15:24.290`) -- [CVE-2025-42971](CVE-2025/CVE-2025-429xx/CVE-2025-42971.json) (`2025-07-08T01:15:24.463`) -- [CVE-2025-42973](CVE-2025/CVE-2025-429xx/CVE-2025-42973.json) (`2025-07-08T01:15:24.623`) -- [CVE-2025-42974](CVE-2025/CVE-2025-429xx/CVE-2025-42974.json) (`2025-07-08T01:15:24.773`) -- [CVE-2025-42978](CVE-2025/CVE-2025-429xx/CVE-2025-42978.json) (`2025-07-08T01:15:24.930`) -- [CVE-2025-42979](CVE-2025/CVE-2025-429xx/CVE-2025-42979.json) (`2025-07-08T01:15:25.107`) -- [CVE-2025-42980](CVE-2025/CVE-2025-429xx/CVE-2025-42980.json) (`2025-07-08T01:15:25.270`) -- [CVE-2025-42981](CVE-2025/CVE-2025-429xx/CVE-2025-42981.json) (`2025-07-08T01:15:25.427`) -- [CVE-2025-42985](CVE-2025/CVE-2025-429xx/CVE-2025-42985.json) (`2025-07-08T01:15:25.577`) -- [CVE-2025-42986](CVE-2025/CVE-2025-429xx/CVE-2025-42986.json) (`2025-07-08T01:15:25.730`) -- [CVE-2025-42992](CVE-2025/CVE-2025-429xx/CVE-2025-42992.json) (`2025-07-08T01:15:25.887`) -- [CVE-2025-43001](CVE-2025/CVE-2025-430xx/CVE-2025-43001.json) (`2025-07-08T01:15:26.047`) -- [CVE-2025-7152](CVE-2025/CVE-2025-71xx/CVE-2025-7152.json) (`2025-07-08T00:15:22.443`) -- [CVE-2025-7153](CVE-2025/CVE-2025-71xx/CVE-2025-7153.json) (`2025-07-08T00:15:23.237`) -- [CVE-2025-7154](CVE-2025/CVE-2025-71xx/CVE-2025-7154.json) (`2025-07-08T01:15:26.200`) -- [CVE-2025-7155](CVE-2025/CVE-2025-71xx/CVE-2025-7155.json) (`2025-07-08T01:15:26.400`) +- [CVE-2025-20686](CVE-2025/CVE-2025-206xx/CVE-2025-20686.json) (`2025-07-08T03:15:27.987`) +- [CVE-2025-20687](CVE-2025/CVE-2025-206xx/CVE-2025-20687.json) (`2025-07-08T03:15:28.143`) +- [CVE-2025-20688](CVE-2025/CVE-2025-206xx/CVE-2025-20688.json) (`2025-07-08T03:15:28.350`) +- [CVE-2025-20689](CVE-2025/CVE-2025-206xx/CVE-2025-20689.json) (`2025-07-08T03:15:28.503`) +- [CVE-2025-20690](CVE-2025/CVE-2025-206xx/CVE-2025-20690.json) (`2025-07-08T03:15:28.653`) +- [CVE-2025-20691](CVE-2025/CVE-2025-206xx/CVE-2025-20691.json) (`2025-07-08T03:15:28.807`) +- [CVE-2025-20692](CVE-2025/CVE-2025-206xx/CVE-2025-20692.json) (`2025-07-08T03:15:28.950`) +- [CVE-2025-20693](CVE-2025/CVE-2025-206xx/CVE-2025-20693.json) (`2025-07-08T03:15:29.100`) +- [CVE-2025-20694](CVE-2025/CVE-2025-206xx/CVE-2025-20694.json) (`2025-07-08T03:15:29.250`) +- [CVE-2025-20695](CVE-2025/CVE-2025-206xx/CVE-2025-20695.json) (`2025-07-08T03:15:29.433`) +- [CVE-2025-53610](CVE-2025/CVE-2025-536xx/CVE-2025-53610.json) (`2025-07-08T03:15:29.617`) +- [CVE-2025-53611](CVE-2025/CVE-2025-536xx/CVE-2025-53611.json) (`2025-07-08T03:15:29.727`) +- [CVE-2025-53612](CVE-2025/CVE-2025-536xx/CVE-2025-53612.json) (`2025-07-08T03:15:29.810`) +- [CVE-2025-53613](CVE-2025/CVE-2025-536xx/CVE-2025-53613.json) (`2025-07-08T03:15:29.913`) +- [CVE-2025-53614](CVE-2025/CVE-2025-536xx/CVE-2025-53614.json) (`2025-07-08T03:15:30.007`) +- [CVE-2025-53615](CVE-2025/CVE-2025-536xx/CVE-2025-53615.json) (`2025-07-08T03:15:30.117`) +- [CVE-2025-53616](CVE-2025/CVE-2025-536xx/CVE-2025-53616.json) (`2025-07-08T03:15:30.240`) +- [CVE-2025-53617](CVE-2025/CVE-2025-536xx/CVE-2025-53617.json) (`2025-07-08T03:15:30.337`) +- [CVE-2025-5570](CVE-2025/CVE-2025-55xx/CVE-2025-5570.json) (`2025-07-08T03:15:30.423`) +- [CVE-2025-6244](CVE-2025/CVE-2025-62xx/CVE-2025-6244.json) (`2025-07-08T03:15:30.947`) +- [CVE-2025-7146](CVE-2025/CVE-2025-71xx/CVE-2025-7146.json) (`2025-07-08T02:15:22.367`) +- [CVE-2025-7156](CVE-2025/CVE-2025-71xx/CVE-2025-7156.json) (`2025-07-08T02:15:22.580`) +- [CVE-2025-7157](CVE-2025/CVE-2025-71xx/CVE-2025-7157.json) (`2025-07-08T03:15:31.123`) +- [CVE-2025-7158](CVE-2025/CVE-2025-71xx/CVE-2025-7158.json) (`2025-07-08T03:15:31.373`) +- [CVE-2025-7159](CVE-2025/CVE-2025-71xx/CVE-2025-7159.json) (`2025-07-08T03:15:31.590`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `1` -- [CVE-2014-3931](CVE-2014/CVE-2014-39xx/CVE-2014-3931.json) (`2025-07-08T01:00:02.203`) -- [CVE-2016-10033](CVE-2016/CVE-2016-100xx/CVE-2016-10033.json) (`2025-07-08T01:00:02.203`) -- [CVE-2019-5418](CVE-2019/CVE-2019-54xx/CVE-2019-5418.json) (`2025-07-08T01:00:02.203`) -- [CVE-2019-9621](CVE-2019/CVE-2019-96xx/CVE-2019-9621.json) (`2025-07-08T01:00:02.203`) +- [CVE-2025-6032](CVE-2025/CVE-2025-60xx/CVE-2025-6032.json) (`2025-07-08T03:15:30.727`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ff5fe784d4b..9a15acf7f26 100644 --- a/_state.csv +++ b/_state.csv @@ -68077,7 +68077,7 @@ CVE-2014-3927,0,0,86f636600b41c5e01ae9967b39f677a51a2614708364a31a10d26e1eca205a CVE-2014-3928,0,0,903fe252a26598e26721b5e748691d6e637f528bf5e422b456648cde071378fc,2025-04-20T01:37:25.860000 CVE-2014-3929,0,0,a04e609ecad2281abeae888f29ace5eb02089955860b530f0f5076208b03f57c,2025-04-20T01:37:25.860000 CVE-2014-3930,0,0,a98d9d9f1bbc1b58fcae623f751d2a962630568247ddb3bca8772d4427b3bca7,2025-04-20T01:37:25.860000 -CVE-2014-3931,0,1,628d07f0c1c56b2cc5a6ff2040e4011b02801df70e31b448ea860c0f2309565f,2025-07-08T01:00:02.203000 +CVE-2014-3931,0,0,628d07f0c1c56b2cc5a6ff2040e4011b02801df70e31b448ea860c0f2309565f,2025-07-08T01:00:02.203000 CVE-2014-3932,0,0,ec39df121430fdf6f013310dfb615cec4434a46af1eee3651caae1ec3608387f,2025-04-12T10:46:40.837000 CVE-2014-3933,0,0,7629fc2ce8142d295259c168213a9f8a3f509951c17abd0ff5932ddf5a1bdab8,2025-04-12T10:46:40.837000 CVE-2014-3934,0,0,def88b2e92d8f646c21582f774bcc5bc7fd2f8fe2ce4066cdc5029d389b5b5be,2025-04-12T10:46:40.837000 @@ -83370,7 +83370,7 @@ CVE-2016-10029,0,0,982b531edcf8cdd93554ea1fb21fb6f57d44ee3b5c10cc1164cc6767eac73 CVE-2016-1003,0,0,46f4e8b9f3f1587cc78f0e4731fc46641c247866f4b72789f875d8e0fe9630d3,2023-11-07T02:29:50.493000 CVE-2016-10030,0,0,48644b453420d45898b778f35cf7709150aa36ac2e0fc075871d929b762614ba,2025-04-12T10:46:40.837000 CVE-2016-10031,0,0,499234c3922a7ad8a4fa0e055a5f42b6648f3167133f5b84c539fdb775e59d66,2025-04-12T10:46:40.837000 -CVE-2016-10033,0,1,7b3a3e63d01eee64e8977e4bfcd78a186b1a3712c95acfaf66e32aa1e3c6a0bc,2025-07-08T01:00:02.203000 +CVE-2016-10033,0,0,7b3a3e63d01eee64e8977e4bfcd78a186b1a3712c95acfaf66e32aa1e3c6a0bc,2025-07-08T01:00:02.203000 CVE-2016-10034,0,0,4b4e8dfb9cf57831c04fd52dbf89ae45182ae1bd15cfad3c3cfeba8de274476e,2025-04-12T10:46:40.837000 CVE-2016-10036,0,0,ff09b000fa6dd15cb7c2846e0b66629a237528e8defb152934ba992b988032f2,2024-11-21T02:43:07.953000 CVE-2016-10037,0,0,adcdda088e2432a6585e17a419dd984b0727cab2390a62345c5125065180e123,2025-04-12T10:46:40.837000 @@ -140663,7 +140663,7 @@ CVE-2019-5414,0,0,0b6e623da7fa05cc02c9d4ae273975a56909dde7118ce987ea3ad6d32acc92 CVE-2019-5415,0,0,1e91a7c37cbce12d8b7111c2c34f6147cf14cd1ced6bddf7c149d21750872544,2024-11-21T04:44:53.557000 CVE-2019-5416,0,0,b100879971280c379ffe8a500bc78a0ea0baf7b8f5be094c6a408a9a239580ef,2024-11-21T04:44:53.667000 CVE-2019-5417,0,0,d98c5f7add52766fc7c3e142426b4ba800ad9d35719d2543c1e890dd9b2efb27,2024-11-21T04:44:53.777000 -CVE-2019-5418,0,1,0ca62e2a1a1492d82f32aebdb56b377303eb90309149976f1dcdcac5aea3164a,2025-07-08T01:00:02.203000 +CVE-2019-5418,0,0,0ca62e2a1a1492d82f32aebdb56b377303eb90309149976f1dcdcac5aea3164a,2025-07-08T01:00:02.203000 CVE-2019-5419,0,0,2ac65527707212d60b559b1ed0c37c5ef3373d700a556d668634c4b4b1fe2523,2024-11-21T04:44:54.017000 CVE-2019-5420,0,0,f19b3724aa167883e4e4e56b2c5c938fcb345d2d81dc9479f43ac2289ffe0ce0,2024-11-21T04:44:54.150000 CVE-2019-5421,0,0,a858970ade7d911d7af83b8bcbd0976bda524681608de710f41e0feb41cc2376,2024-11-21T04:44:54.277000 @@ -144022,7 +144022,7 @@ CVE-2019-9616,0,0,a66344f9c3f4cda343b0f89c1932c7c323618ca0c5677bd95ae90978bdd96c CVE-2019-9617,0,0,b95d192402e6296f016c4d751164ca3cf0686290005bd89d09ee11437643981c,2024-11-21T04:51:58.763000 CVE-2019-9618,0,0,dfc826e406483085c59aa198a8cd6c3ac0f507e9de2603141a59077d821c0bc0,2024-11-21T04:51:58.900000 CVE-2019-9619,0,0,529d01e46fda23f944ae56887b327d92043af68907cc5438f833b6270706b398,2023-11-07T03:13:44.243000 -CVE-2019-9621,0,1,621e1d19c00a9e4cebb683612101386bde7ef8775dd41e0b53b56795c1ba5f31,2025-07-08T01:00:02.203000 +CVE-2019-9621,0,0,621e1d19c00a9e4cebb683612101386bde7ef8775dd41e0b53b56795c1ba5f31,2025-07-08T01:00:02.203000 CVE-2019-9622,0,0,a5313a359c697e81fe3f797489d45a2f1b7097f6e6cea15017862e84fe5fee4d,2024-11-21T04:51:59.223000 CVE-2019-9623,0,0,3c5698b655752a654204af8c8ad0713732eb40f37e01a957d6775d041ae21380,2024-11-21T04:51:59.367000 CVE-2019-9624,0,0,cea2615715668acccc818448dcb48e3ad579d43c3e890307bbe45eb64b410d05,2024-11-21T04:51:59.507000 @@ -284826,7 +284826,23 @@ CVE-2025-20676,0,0,6ffa62b39c924bd91e9970f05d2047c0093e00eff6344a8042d1538b148b1 CVE-2025-20677,0,0,361a457eff90f26ccd673ab8175f2254dd335c177659182e175423ee667fba79,2025-06-03T18:15:24.633000 CVE-2025-20678,0,0,4eba7220663cf1a323051976c87005046899f50b2e0b9319a8560eb4c82ecc09,2025-06-02T17:32:17.397000 CVE-2025-2068,0,0,caea7b6972516a21e1fb4cb2f8db6e455533cd0aab201f39e697eeb619aa0bfd,2025-04-29T13:52:28.490000 +CVE-2025-20680,1,1,af8a0b5f8f03ed5a2f5de13e2c519ae6c77bf4f4aaa87f9bc98159879a328feb,2025-07-08T03:15:26.423000 +CVE-2025-20681,1,1,7594ebad7b7359d24de8a23fa7541dbff7a4cf3a3c1e49dd5330c19b782b3d9e,2025-07-08T03:15:27.260000 +CVE-2025-20682,1,1,4b69e5425517559b1beb51834b9ee76441edc719bc4ee1396f9848e71eb212f2,2025-07-08T03:15:27.407000 +CVE-2025-20683,1,1,9a9b9674417f2f91ab30ae5dd2805f5fc6164e1229d67c7c3426c8efe3be3e84,2025-07-08T03:15:27.550000 +CVE-2025-20684,1,1,0fa97884ee2ad1f3eb122e6ee8b5207851284fa340529389c4cdec1201b77d83,2025-07-08T03:15:27.690000 +CVE-2025-20685,1,1,2a915cf6088c75f058712907edb2831dab35a45b8474502bf6bac7a9dd0928c4,2025-07-08T03:15:27.833000 +CVE-2025-20686,1,1,aed6eff96e662130089b9d0adaff6a7759ec6a49178c8a24f522e9ec62b0cf62,2025-07-08T03:15:27.987000 +CVE-2025-20687,1,1,3b373e2bd808b3e7732df6b725abb80bea0db42f74adca01670d3c83d5d5c9fc,2025-07-08T03:15:28.143000 +CVE-2025-20688,1,1,cf137b5a7eb6c1d923c526c7ea0b646dacd66008c873407035d566f5a60fc08b,2025-07-08T03:15:28.350000 +CVE-2025-20689,1,1,0f50a3ab765f0f4eecac6b716ab4a0dbf59c8bbd9853a4d482bf807fdf0813a8,2025-07-08T03:15:28.503000 CVE-2025-2069,0,0,3be67bf54f8ec61314fa1aeec7cad10107ab60b66fe6d57dfc7b2068092e5954,2025-04-29T13:52:28.490000 +CVE-2025-20690,1,1,43dd2fbd89c284e7500283bb9f60939532861dfcf0337ebe4f25146c3cff23d8,2025-07-08T03:15:28.653000 +CVE-2025-20691,1,1,b33b408b319c412ca684c6f5d7374cf9976c5af8b57b3992317a41bbc4039120,2025-07-08T03:15:28.807000 +CVE-2025-20692,1,1,e4b0b083e98bd13ee17d0fa70355eb35ebf9026ae40205cd0cb6ff608fb9d0b2,2025-07-08T03:15:28.950000 +CVE-2025-20693,1,1,71ed0f04f93379c99f8830f622f25680ce7128d08e58fd772391e1a6351072ab,2025-07-08T03:15:29.100000 +CVE-2025-20694,1,1,a77d6d7f6bcac2a8dcbbb7f25ac1ce9d5b8ac6fbc49b2b8f38d860b82c0a39f4,2025-07-08T03:15:29.250000 +CVE-2025-20695,1,1,7779e0cd59eab3d08abd061a93fd36d2611eb1c7d65794528df3df7d40543de5,2025-07-08T03:15:29.433000 CVE-2025-2070,0,0,aa6c57d00653559715f3617271164e399083db51bc42952895ad83bcf08a7d15,2025-04-29T13:52:28.490000 CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000 CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000 @@ -292332,7 +292348,7 @@ CVE-2025-3130,0,0,3331839c90977481f0952c53c01c561e7ce3f9a4b6241dc2a679ea92329653 CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db14c,2025-04-22T16:16:30.543000 CVE-2025-31324,0,0,f022551eb03f972b51d5adf3fa8b8bd88e48c383f69788d6260b2cb6e8237e8d,2025-05-06T20:59:33.773000 CVE-2025-31325,0,0,550c7b1d47a5a5766f5606913daeeb0e6f07a070553574431b9e6eac29d0e505,2025-06-12T16:06:39.330000 -CVE-2025-31326,1,1,97747191f9d7ecb4e551a0c0d26b8a5797d5787be7e35a1195ff20aa4c1d858d,2025-07-08T01:15:21.810000 +CVE-2025-31326,0,0,97747191f9d7ecb4e551a0c0d26b8a5797d5787be7e35a1195ff20aa4c1d858d,2025-07-08T01:15:21.810000 CVE-2025-31327,0,0,32f90adc396c5de5b649e8fa5cbb5b70c97a786ce6ce173df87cdac30806552e,2025-04-23T14:08:13.383000 CVE-2025-31328,0,0,7562727b37bc696206e3437191848ea7fd9fb71483caff96e2687c6513ba8732,2025-04-23T14:08:13.383000 CVE-2025-31329,0,0,1fc101be6dd06c49bba529860427b1b9723c1206bb0b29e1d558e09c6f01e194,2025-05-13T19:35:25.503000 @@ -295810,43 +295826,43 @@ CVE-2025-4291,0,0,3c966d095e0027ee25fc69633f95e30252d911138428dd59f98b42d5972922 CVE-2025-4292,0,0,3b0e06bfdd97a17ba7f68946a85abe7ce662b331b5db371d423d8c2c22e38a38,2025-06-17T20:17:44 CVE-2025-42921,0,0,fe45c9bf48d8b64b0cac9604dcc1ad3071452dfd7112cafe12dd9c33c82af017,2025-04-23T15:25:30.927000 CVE-2025-4293,0,0,3e0fba3b11651bbd0f80afc0b87a24c09c8226e80f3350735e023f15e0a509b4,2025-06-17T20:17:29.200000 -CVE-2025-42952,1,1,768bcb21d776f11485a2152ac2dc0bc7598a8ee5e50ee1082d5b052c728d9328,2025-07-08T01:15:22 -CVE-2025-42953,1,1,1741d0db8362bf68b72a94a7bc94759493f1591ad7cdcbfb856df8c762f30086,2025-07-08T01:15:22.163000 -CVE-2025-42954,1,1,3d6fa81167173620b022305ba34ea04bc5b97373e3681aaccd6730092982902a,2025-07-08T01:15:22.317000 -CVE-2025-42959,1,1,d5b01cf70a8a433d4660d71c79e0cd35066490817f078e01438734aadc02e44f,2025-07-08T01:15:22.477000 -CVE-2025-42960,1,1,a89186331f55bed8cbab7ef13d784bde9dc4953755cfe296098974f13d09bafe,2025-07-08T01:15:22.633000 -CVE-2025-42961,1,1,2a9cd005f1d38d17bbbd4cdadb65a99fa4810911bd990533ae7e0c7f7028d38f,2025-07-08T01:15:22.783000 -CVE-2025-42962,1,1,10a76ecedc82f8c73f4165b127729cde329e2a1b8397decd07283e995d13713f,2025-07-08T01:15:22.937000 -CVE-2025-42963,1,1,3eceb758431bd7a9b776e6e359f16ac8c0bd21ef6b4f957b0e4b861a43f9a6ad,2025-07-08T01:15:23.093000 -CVE-2025-42964,1,1,35eca8fe2e5b0b8592914d5f9aceac811262537d112dd16fac42dd7a2874f291,2025-07-08T01:15:23.240000 -CVE-2025-42965,1,1,5468ec2b856abda7976d3a7237854316e3a567ad8f1e21914fd754cca072a790,2025-07-08T01:15:23.440000 -CVE-2025-42966,1,1,f5060d8be8c97a112f6bc890e97f1361483623af18e26949db8b983231720bd9,2025-07-08T01:15:23.630000 -CVE-2025-42967,1,1,a6e510917a634ebb18bbae9d20133392f6b21c2e7e0c465ace2491b306170cbb,2025-07-08T01:15:23.787000 -CVE-2025-42968,1,1,8d0a352810ded26f1ea99be4361c89b7f442d5266f1052174dabce56e8dd9e2f,2025-07-08T01:15:23.950000 -CVE-2025-42969,1,1,9338f259fb3824acc0cf0f061beeaca8fff6d92da434d45e0c6b7290c985ddcf,2025-07-08T01:15:24.120000 +CVE-2025-42952,0,0,768bcb21d776f11485a2152ac2dc0bc7598a8ee5e50ee1082d5b052c728d9328,2025-07-08T01:15:22 +CVE-2025-42953,0,0,1741d0db8362bf68b72a94a7bc94759493f1591ad7cdcbfb856df8c762f30086,2025-07-08T01:15:22.163000 +CVE-2025-42954,0,0,3d6fa81167173620b022305ba34ea04bc5b97373e3681aaccd6730092982902a,2025-07-08T01:15:22.317000 +CVE-2025-42959,0,0,d5b01cf70a8a433d4660d71c79e0cd35066490817f078e01438734aadc02e44f,2025-07-08T01:15:22.477000 +CVE-2025-42960,0,0,a89186331f55bed8cbab7ef13d784bde9dc4953755cfe296098974f13d09bafe,2025-07-08T01:15:22.633000 +CVE-2025-42961,0,0,2a9cd005f1d38d17bbbd4cdadb65a99fa4810911bd990533ae7e0c7f7028d38f,2025-07-08T01:15:22.783000 +CVE-2025-42962,0,0,10a76ecedc82f8c73f4165b127729cde329e2a1b8397decd07283e995d13713f,2025-07-08T01:15:22.937000 +CVE-2025-42963,0,0,3eceb758431bd7a9b776e6e359f16ac8c0bd21ef6b4f957b0e4b861a43f9a6ad,2025-07-08T01:15:23.093000 +CVE-2025-42964,0,0,35eca8fe2e5b0b8592914d5f9aceac811262537d112dd16fac42dd7a2874f291,2025-07-08T01:15:23.240000 +CVE-2025-42965,0,0,5468ec2b856abda7976d3a7237854316e3a567ad8f1e21914fd754cca072a790,2025-07-08T01:15:23.440000 +CVE-2025-42966,0,0,f5060d8be8c97a112f6bc890e97f1361483623af18e26949db8b983231720bd9,2025-07-08T01:15:23.630000 +CVE-2025-42967,0,0,a6e510917a634ebb18bbae9d20133392f6b21c2e7e0c465ace2491b306170cbb,2025-07-08T01:15:23.787000 +CVE-2025-42968,0,0,8d0a352810ded26f1ea99be4361c89b7f442d5266f1052174dabce56e8dd9e2f,2025-07-08T01:15:23.950000 +CVE-2025-42969,0,0,9338f259fb3824acc0cf0f061beeaca8fff6d92da434d45e0c6b7290c985ddcf,2025-07-08T01:15:24.120000 CVE-2025-4297,0,0,2125bd423cd8ee8185dc917035443ae13b98a933b8dab9e4e9a974e1b93ea733,2025-05-16T17:44:43.850000 -CVE-2025-42970,1,1,297fc1e2ba1c14dbe5bd505fa3c89552007ea34556578cbbf833ac087705be7b,2025-07-08T01:15:24.290000 -CVE-2025-42971,1,1,4cad154b4ee90a857234e7063e5c465f9082e3eb4d5b97a829dcca0253a74c9d,2025-07-08T01:15:24.463000 -CVE-2025-42973,1,1,49b8336a92be1c55e6b9eb63e4c5855a9103ff4ee08c29904e5bb21666614cfc,2025-07-08T01:15:24.623000 -CVE-2025-42974,1,1,2110eefab2c0feb97089f6b4f42310beea47c1c0fe5b1d7e1f69b412e743935a,2025-07-08T01:15:24.773000 +CVE-2025-42970,0,0,297fc1e2ba1c14dbe5bd505fa3c89552007ea34556578cbbf833ac087705be7b,2025-07-08T01:15:24.290000 +CVE-2025-42971,0,0,4cad154b4ee90a857234e7063e5c465f9082e3eb4d5b97a829dcca0253a74c9d,2025-07-08T01:15:24.463000 +CVE-2025-42973,0,0,49b8336a92be1c55e6b9eb63e4c5855a9103ff4ee08c29904e5bb21666614cfc,2025-07-08T01:15:24.623000 +CVE-2025-42974,0,0,2110eefab2c0feb97089f6b4f42310beea47c1c0fe5b1d7e1f69b412e743935a,2025-07-08T01:15:24.773000 CVE-2025-42977,0,0,cc9ae0e46200dea4243b9844a4fe105554475587976aa2e885549e66131394da,2025-06-12T16:06:39.330000 -CVE-2025-42978,1,1,2523b44e162b8bd1d841960211fe9d53134ee2f7a88691f864fd3ddeb7e14606,2025-07-08T01:15:24.930000 -CVE-2025-42979,1,1,05a43941f2db0c355cef3d700bc8e776e51a17162eeda5028cce22375c0f9b15,2025-07-08T01:15:25.107000 +CVE-2025-42978,0,0,2523b44e162b8bd1d841960211fe9d53134ee2f7a88691f864fd3ddeb7e14606,2025-07-08T01:15:24.930000 +CVE-2025-42979,0,0,05a43941f2db0c355cef3d700bc8e776e51a17162eeda5028cce22375c0f9b15,2025-07-08T01:15:25.107000 CVE-2025-4298,0,0,e54afc5cb294aa37ab5ddf7cb60307aaa6afeb78004ee588006228c0c5b744b4,2025-05-13T20:06:19.080000 -CVE-2025-42980,1,1,025244ac3cd19547b69de612ccd1f7e177717aacc7ebab940de3d9eb2517fa1d,2025-07-08T01:15:25.270000 -CVE-2025-42981,1,1,c03cbc3aec3769340850877e016e67298a888abdd40e3cc82b8b3705d8fe406a,2025-07-08T01:15:25.427000 +CVE-2025-42980,0,0,025244ac3cd19547b69de612ccd1f7e177717aacc7ebab940de3d9eb2517fa1d,2025-07-08T01:15:25.270000 +CVE-2025-42981,0,0,c03cbc3aec3769340850877e016e67298a888abdd40e3cc82b8b3705d8fe406a,2025-07-08T01:15:25.427000 CVE-2025-42982,0,0,e6968c3fd7871556e1e29606a4f8dbcd4707b8846dc0d2a09bc157db8b57cc24,2025-06-12T16:06:39.330000 CVE-2025-42983,0,0,1b0371afa97d4d0347bddcd8ab1cfda4660ea8f2c5878217b37c9e5cdc2ac967,2025-06-12T16:06:39.330000 CVE-2025-42984,0,0,7e6a153ab4f0a760b3d0e2df015134c0a7cce8a9e0c5a0424eb4c14f09f58894,2025-06-12T16:06:39.330000 -CVE-2025-42985,1,1,23bfa90335b4026cee62c8268f435b9b1edd6f9821da86eb80e036ca956ae9e3,2025-07-08T01:15:25.577000 -CVE-2025-42986,1,1,eb2ac8fff323b248a9469f1f0699df7f57c8a401b7d13bc375054f7b2bdb9f8b,2025-07-08T01:15:25.730000 +CVE-2025-42985,0,0,23bfa90335b4026cee62c8268f435b9b1edd6f9821da86eb80e036ca956ae9e3,2025-07-08T01:15:25.577000 +CVE-2025-42986,0,0,eb2ac8fff323b248a9469f1f0699df7f57c8a401b7d13bc375054f7b2bdb9f8b,2025-07-08T01:15:25.730000 CVE-2025-42987,0,0,57e561deb69074295408ad93b87915b59df3e27da58e7c9dc77ffc675fb4f969,2025-06-12T16:06:39.330000 CVE-2025-42988,0,0,802715f7a93ebc8f9f5311d82d3ea45d70eb23bce1f100c736f7d19e12e423ab,2025-06-12T16:06:39.330000 CVE-2025-42989,0,0,f7c874047faa5bbde13807979293b3a3f749e5612e701215df5efa9c37a39e0c,2025-06-12T16:06:39.330000 CVE-2025-4299,0,0,cc4a3e24204515aaf4850521a61cefe5731008dd8b97ebba472ff5c5a801f5ca,2025-05-13T20:06:00.377000 CVE-2025-42990,0,0,3a9e5f7c57455afc01a40c0ea2245139d37a87774fde193be7c4255a63f51cb4,2025-06-12T16:06:39.330000 CVE-2025-42991,0,0,483fe762357a709c84ee8b01c25339045c78ff0318a3cc007a6356796e166421,2025-06-12T16:06:39.330000 -CVE-2025-42992,1,1,96ce2567afed88e5f49a397de2e5cd2b29cc5415d8f6a30174112626eb1ac1e0,2025-07-08T01:15:25.887000 +CVE-2025-42992,0,0,96ce2567afed88e5f49a397de2e5cd2b29cc5415d8f6a30174112626eb1ac1e0,2025-07-08T01:15:25.887000 CVE-2025-42993,0,0,770b23d31b6a3733e5f2e2910516b7bc5d5f11275ee3a601562cde06caf0884c,2025-06-12T16:06:39.330000 CVE-2025-42994,0,0,145ac3aa415b4167c9777bfe2d4a55a89181bcc2e386f22a825736b3071eaabb,2025-06-12T16:06:39.330000 CVE-2025-42995,0,0,3ec9ec8f855874770ecce1d03a99a91e674f14d0bfac33ac9017da879811ca6f,2025-06-12T16:06:39.330000 @@ -295856,7 +295872,7 @@ CVE-2025-42998,0,0,2bfe656344a0b85a5f4fff2abcf4a6577e799789f89dc0ea98745669a30ec CVE-2025-42999,0,0,a0a9942912bd021b739fb32ce123af4bb7497f07493d1c056f2a75451f04f20d,2025-05-16T19:44:49.400000 CVE-2025-4300,0,0,f7c03ed92744380706d903a9f694588f32e405152084eae0fc0569337f5db7ce,2025-05-13T20:22:08.717000 CVE-2025-43000,0,0,e31fc74811b3e3770c864cd0f324b9ae9ae79a3c82cdc5b33a35261048a81925,2025-05-13T19:35:25.503000 -CVE-2025-43001,1,1,b0c7292d301e8ed28cbd3ff11650a2455582cf81da9979e867729586e9206a22,2025-07-08T01:15:26.047000 +CVE-2025-43001,0,0,b0c7292d301e8ed28cbd3ff11650a2455582cf81da9979e867729586e9206a22,2025-07-08T01:15:26.047000 CVE-2025-43002,0,0,434480ab85f45382cf8911be3496b00027aeca710a87c1831baed9aeffb6a42f,2025-05-13T19:35:18.080000 CVE-2025-43003,0,0,c5a14dcddb63dd3a6317cb81df2b91482d1e16b9c687c3fd2da6622f294a0a59,2025-05-13T19:35:18.080000 CVE-2025-43004,0,0,c44496c430b2ebc5fb5dac27e9ac73a29a0d9eebcd7c1bf6e68e10748aefecc2,2025-05-13T19:35:18.080000 @@ -299466,6 +299482,14 @@ CVE-2025-53603,0,0,0ef57944661b4a8c37178144fe0bcd4e8f50c238641c089e241bfcc769261 CVE-2025-53604,0,0,1bab9e277cfa892c064c40bbba3b5c77ef51c31c8d81c51bf21cb4ac9451d9e9,2025-07-05T01:15:28.340000 CVE-2025-53605,0,0,e1850a90bbd00208fdd0f92f6be0091829f3c2d4f97e87d63797a52d65dc4d4d,2025-07-05T01:15:28.523000 CVE-2025-5361,0,0,63ed55da0a8819c3072e9ae5cbf20f6ad96bd8fa3415071144a15d946aef0cb0,2025-06-03T15:35:09.950000 +CVE-2025-53610,1,1,156dd78a0c1b31a38abe89aaf6d0ce2631a27f0548bb6395c2827bca8600bd0d,2025-07-08T03:15:29.617000 +CVE-2025-53611,1,1,bfd482962f5103cd0aa9fa24e86320a1b2a415984fe058e01ecfaf089a3342d6,2025-07-08T03:15:29.727000 +CVE-2025-53612,1,1,2f78f0acf63fe51038e0445f7a1597f9d4a318bb4b2f3f536ec2c854804f7320,2025-07-08T03:15:29.810000 +CVE-2025-53613,1,1,e3c15eaea1ad8b963cee31efb9bf97eb50568119e629cdbdfc4bb61fc0acb05e,2025-07-08T03:15:29.913000 +CVE-2025-53614,1,1,1455a49a2896192a3a9e4e1c0662a97b634f4f07e1f877901bfc57552994a878,2025-07-08T03:15:30.007000 +CVE-2025-53615,1,1,633e3bf8ba00420527ab77486009eed1958a5e888b671857bb2673569610c633,2025-07-08T03:15:30.117000 +CVE-2025-53616,1,1,1cf0204b7330bfe8e4e3f581ea40aa23326df22768a5dd743b5aed895531417e,2025-07-08T03:15:30.240000 +CVE-2025-53617,1,1,bbf57c26ed72eb04e66ebb33ac077758620f1eff2be7f8e7251ed7d98e97a9ca,2025-07-08T03:15:30.337000 CVE-2025-5362,0,0,33b74730f9e7ac14985e93de797c2da60e582983293fbae692e330f50a44162c,2025-06-03T15:34:57.473000 CVE-2025-5363,0,0,d48d3a878cc2187658148b214cb6829e36972108c01dfa0cb86b9cac54da6616,2025-06-03T15:34:39.567000 CVE-2025-5364,0,0,95a5e56210a5d35c1ea6e33ff22c35248d45f8b8e37cb258e052523a9909bca6,2025-06-03T15:34:20.917000 @@ -299628,6 +299652,7 @@ CVE-2025-5566,0,0,779c860a161eb64dc6f40dd7f0ca399f4546b6e4ee22bf38748c51ae144c43 CVE-2025-5567,0,0,da23b4ba25131dd28d32f4d0fb99f3359181dd06bd95a7ecaf592a778a36fae8,2025-07-04T03:15:21.040000 CVE-2025-5568,0,0,3985b2b3c56041cfacfc47ea29b5076a771839690445a0941918b66a37c31945,2025-06-09T12:15:47.880000 CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000 +CVE-2025-5570,1,1,4d00f47ecd2b611a14b258e837d2ce9ee5cf2a39afcfba71ea3f9783a041339c,2025-07-08T03:15:30.423000 CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000 CVE-2025-5572,0,0,f58a8b0d677b3b1e3374f5b4bd151cd210da95aa5b9dd2a74ae8e59ebb8e1e16,2025-06-06T18:48:37.333000 CVE-2025-5573,0,0,6e69e3f6614bb634486e032f3753cb8f537723c56a38d21eec74aa1f5111ea31,2025-06-06T18:48:46.463000 @@ -300000,7 +300025,7 @@ CVE-2025-6022,0,0,673713355118472c1ebaabd5c5e4854e0f9320e04b049cdd5cc68d5d0f25f0 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000 CVE-2025-6031,0,0,8862006220262f75545734fb5f034c6db29d3c4cbd11030b12e4d70636f9f9cc,2025-06-16T12:32:18.840000 -CVE-2025-6032,0,0,7d36c2d58b732d43afa3008a3147d35986d6ec9223b352842d54a5562a9f2d17,2025-07-02T08:15:57.507000 +CVE-2025-6032,0,1,f67e1ca89d1ad9336fecdae2d68d83e9b02b8f60c5d6e81682efbe05551b8c71,2025-07-08T03:15:30.727000 CVE-2025-6035,0,0,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f125,2025-06-16T12:32:18.840000 CVE-2025-6039,0,0,54678a3c3f873d8ba1f08ff048f062b795fa075b8a73a104c49bcf010b698d72,2025-07-04T03:15:21.910000 CVE-2025-6040,0,0,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000 @@ -300128,6 +300153,7 @@ CVE-2025-6220,0,0,70ba2b5176193b00d7c5791b5a8342d63e62622f52556ab6ab22db00bbc145 CVE-2025-6224,0,0,c2476a14c43ef31967d89288ff41b75746283c187c9c6cdc794d96fe44a26458,2025-07-03T15:14:12.767000 CVE-2025-6238,0,0,43536995b122e8c09fc85415169b6ce2705e742ae7515aa376619850727f57b7,2025-07-04T03:15:22.237000 CVE-2025-6240,0,0,ba4da5fd605eca3c919532cf0a8a1661ebda5a87c35d4010c4dddeaa23d93e9a,2025-06-23T20:16:59.783000 +CVE-2025-6244,1,1,d19de841906576e8324a3c92e6164494344d5067aac942ccb32f69872f61c68d,2025-07-08T03:15:30.947000 CVE-2025-6252,0,0,04266fde32de91a19cd75afe711753a0e9f9154bece1418589e4e14bad3b2599,2025-07-07T14:51:20.410000 CVE-2025-6257,0,0,cc91b7557b526c88672e08add1b684bde89a65ab4dd7fa052a99a1c1c9c823b5,2025-06-23T20:16:40.143000 CVE-2025-6258,0,0,a4b6be5935c4432c7a129304f469494da82c625050798afddedddfa563a7fe1e,2025-06-26T18:57:43.670000 @@ -300727,13 +300753,18 @@ CVE-2025-7142,0,0,960c733c5d78dc534f46715948164cd98d18a21f0c8d4024e18875007a7824 CVE-2025-7143,0,0,441a473db5cda09d82dbc5979193f84fa710d47454b8ae4677353bd10912f319,2025-07-07T20:15:28.973000 CVE-2025-7144,0,0,3a3f7e613c6b4721f9d407a0cae7ad541c6187fe8ca540eb529ba3f7de3b744e,2025-07-07T21:15:25.987000 CVE-2025-7145,0,0,0431922fce794ebe2fb76c85f6a92686a8078a8927733582f3cad39cb892c9b6,2025-07-07T03:15:30.917000 +CVE-2025-7146,1,1,a7c6ba2bffaec4d9e671683ddf3f31d6ff033dcb7ed7c37d75dbdb7a67497fc5,2025-07-08T02:15:22.367000 CVE-2025-7147,0,0,36fb7d2d81135c9ac916fbf4d35323ae340d8c03e69ce3da100c81c97b562e84,2025-07-07T21:15:26.187000 CVE-2025-7148,0,0,fdd19e0d59a74004f00a2708d969a7d930d66906c39a8978c5f58893af295960,2025-07-07T22:15:27.227000 CVE-2025-7149,0,0,ad9d73cf832c7ebd837d39ea1fe909f87836f7cdc3f8f0ff995d4a33ff766e76,2025-07-07T22:15:27.460000 CVE-2025-7150,0,0,b77fe5f832cdc2282a603bb6e72f3afbcd6c075b6d2bbdb84173fce9a56d61d3,2025-07-07T23:15:23.207000 CVE-2025-7151,0,0,e82251d7fe83a1332b07026c390af5ec1aa1c1e0d2d58d9e016eca5cf7deba86,2025-07-07T23:15:23.813000 -CVE-2025-7152,1,1,b0ead946247ac6343a0ade2c5e0f7cbb077e4de4f4c5032b861f243aebf010bd,2025-07-08T00:15:22.443000 -CVE-2025-7153,1,1,da301161fc245318be20b04dc3fd4bdfe29fcc0f9c8a67e241a00dbb990ab636,2025-07-08T00:15:23.237000 -CVE-2025-7154,1,1,1a8533e879ab30d649d5fc250b936c00821e4e6c5eb1a6831ec7843a20c7863b,2025-07-08T01:15:26.200000 -CVE-2025-7155,1,1,18f65f6bc617669b8e2e10d2a7c547bbba3f724f23c4fc3a98eafbf5453296a3,2025-07-08T01:15:26.400000 +CVE-2025-7152,0,0,b0ead946247ac6343a0ade2c5e0f7cbb077e4de4f4c5032b861f243aebf010bd,2025-07-08T00:15:22.443000 +CVE-2025-7153,0,0,da301161fc245318be20b04dc3fd4bdfe29fcc0f9c8a67e241a00dbb990ab636,2025-07-08T00:15:23.237000 +CVE-2025-7154,0,0,1a8533e879ab30d649d5fc250b936c00821e4e6c5eb1a6831ec7843a20c7863b,2025-07-08T01:15:26.200000 +CVE-2025-7155,0,0,18f65f6bc617669b8e2e10d2a7c547bbba3f724f23c4fc3a98eafbf5453296a3,2025-07-08T01:15:26.400000 +CVE-2025-7156,1,1,69691b32841b06123b32c66248b7e50cfd2b28e05c59a46703f6823598b1a316,2025-07-08T02:15:22.580000 +CVE-2025-7157,1,1,fb0ab6cdcd483ee5ab2507f21ed657ed272b448e55adaa21678064387511c835,2025-07-08T03:15:31.123000 +CVE-2025-7158,1,1,d801401be7bfca9ce7b35bab72bb2a194c85030fa8a4a8a6df2185522ff79cd7,2025-07-08T03:15:31.373000 +CVE-2025-7159,1,1,e94c92ddd35c79d1bb4bca41d4c7fa36ba523f9dbab019a68a36db8f883b8350,2025-07-08T03:15:31.590000 CVE-2025-7259,0,0,92aedb6a5e38fb030175a289364c754cf67f487a6a25e9d17c23717610f38507,2025-07-07T16:15:30.440000