diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45347.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45347.json new file mode 100644 index 00000000000..41897a89b18 --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45347.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45347", + "sourceIdentifier": "security@xiaomi.com", + "published": "2025-06-23T10:15:26.397", + "lastModified": "2025-06-23T10:15:26.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthorized access vulnerability exists in the Xiaomi Mi Connect Service APP. The vulnerability is caused by the validation logic is flawed and can be exploited by attackers to Unauthorized access to the victim\u2019s device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@xiaomi.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@xiaomi.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=548", + "source": "security@xiaomi.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27387.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27387.json new file mode 100644 index 00000000000..880dde0954d --- /dev/null +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27387.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27387", + "sourceIdentifier": "security@oppo.com", + "published": "2025-06-23T10:15:27.100", + "lastModified": "2025-06-23T10:15:27.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OPPO Clone Phone uses a weak password WiFi hotspot to transfer files, resulting in Information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@oppo.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@oppo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1937080145974403072https://", + "source": "security@oppo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52935.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52935.json new file mode 100644 index 00000000000..b48e3848173 --- /dev/null +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52935.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-52935", + "sourceIdentifier": "cve_disclosure@tech.gov.sg", + "published": "2025-06-23T10:15:27.380", + "lastModified": "2025-06-23T10:15:27.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Integer Overflow or Wraparound vulnerability in dragonflydb dragonfly (src/redis/lua/struct modules). This vulnerability is associated with program files lua_struct.C.\n\nThis issue affects dragonfly: 1.30.1, 1.30.0, 1.28.18." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:M/U:Red", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "RED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dragonflydb/dragonfly/commit/473e002c848eb312f23d84114eb4951a7c4af5a1", + "source": "cve_disclosure@tech.gov.sg" + }, + { + "url": "https://github.com/dragonflydb/dragonfly/pull/4996", + "source": "cve_disclosure@tech.gov.sg" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52936.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52936.json new file mode 100644 index 00000000000..75ee747f0f6 --- /dev/null +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52936.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-52936", + "sourceIdentifier": "cve_disclosure@tech.gov.sg", + "published": "2025-06-23T10:15:27.570", + "lastModified": "2025-06-23T10:15:27.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Link Resolution Before File Access ('Link Following') vulnerability in yrutschle sslh.This issue affects sslh: before 2.2.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:M/U:Amber", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yrutschle/sslh/pull/494", + "source": "cve_disclosure@tech.gov.sg" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52937.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52937.json new file mode 100644 index 00000000000..ed153f9eaa3 --- /dev/null +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52937.json @@ -0,0 +1,70 @@ +{ + "id": "CVE-2025-52937", + "sourceIdentifier": "cve_disclosure@tech.gov.sg", + "published": "2025-06-23T10:15:27.717", + "lastModified": "2025-06-23T10:15:27.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in PointCloudLibrary PCL (surface/src/3rdparty/opennurbs modules). This vulnerability is associated with program files crc32.C.\n\nThis vulnerability is only relevant if the PCL version is older than 1.14.0 or the user specifically requests to not use the system zlib (WITH_SYSTEM_ZLIB=FALSE)." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:D/RE:M/U:Green", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "NO", + "Recovery": "AUTOMATIC", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ] + }, + "references": [ + { + "url": "https://github.com/PointCloudLibrary/pcl/commit/2f9dc390c6769fbd821fafa0e16f4707ed7c5d79", + "source": "cve_disclosure@tech.gov.sg" + }, + { + "url": "https://github.com/PointCloudLibrary/pcl/pull/6275", + "source": "cve_disclosure@tech.gov.sg" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52938.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52938.json new file mode 100644 index 00000000000..7730f193b7c --- /dev/null +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52938.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-52938", + "sourceIdentifier": "cve_disclosure@tech.gov.sg", + "published": "2025-06-23T10:15:27.857", + "lastModified": "2025-06-23T10:15:27.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds Read vulnerability in dail8859 NotepadNext (src/lua/src modules). This vulnerability is associated with program files lparser.C.\n\n\nThis issue affects NotepadNext: through v0.11.\n\nThe singlevar() in lparser.c lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:D/RE:M/U:Amber", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "AUTOMATIC", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dail8859/NotepadNext/commit/66b8a97d9fdfd2257996875716f39c18d84e004f", + "source": "cve_disclosure@tech.gov.sg" + }, + { + "url": "https://github.com/dail8859/NotepadNext/pull/756", + "source": "cve_disclosure@tech.gov.sg" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-529xx/CVE-2025-52939.json b/CVE-2025/CVE-2025-529xx/CVE-2025-52939.json new file mode 100644 index 00000000000..cedac52b1e5 --- /dev/null +++ b/CVE-2025/CVE-2025-529xx/CVE-2025-52939.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-52939", + "sourceIdentifier": "cve_disclosure@tech.gov.sg", + "published": "2025-06-23T10:15:28.007", + "lastModified": "2025-06-23T10:15:28.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds Write vulnerability in dail8859 NotepadNext (src/lua/src modules). This vulnerability is associated with program files ldebug.C, lvm.C.\n\nThis issue affects NotepadNext: through v0.11." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:M/U:Red", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "subAvailabilityImpact": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NEGLIGIBLE", + "Automatable": "YES", + "Recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "RED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve_disclosure@tech.gov.sg", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dail8859/NotepadNext/commit/3e928d91b8fc8bb5c77801ee8652f41e98d12571", + "source": "cve_disclosure@tech.gov.sg" + }, + { + "url": "https://github.com/dail8859/NotepadNext/pull/757/files", + "source": "cve_disclosure@tech.gov.sg" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f83abbd9757..e4046d108f9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-23T10:00:36.196618+00:00 +2025-06-23T12:00:40.268149+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-23T09:15:21.580000+00:00 +2025-06-23T10:15:28.007000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299063 +299070 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `7` -- [CVE-2024-3511](CVE-2024/CVE-2024-35xx/CVE-2024-3511.json) (`2025-06-23T09:15:21.580`) +- [CVE-2024-45347](CVE-2024/CVE-2024-453xx/CVE-2024-45347.json) (`2025-06-23T10:15:26.397`) +- [CVE-2025-27387](CVE-2025/CVE-2025-273xx/CVE-2025-27387.json) (`2025-06-23T10:15:27.100`) +- [CVE-2025-52935](CVE-2025/CVE-2025-529xx/CVE-2025-52935.json) (`2025-06-23T10:15:27.380`) +- [CVE-2025-52936](CVE-2025/CVE-2025-529xx/CVE-2025-52936.json) (`2025-06-23T10:15:27.570`) +- [CVE-2025-52937](CVE-2025/CVE-2025-529xx/CVE-2025-52937.json) (`2025-06-23T10:15:27.717`) +- [CVE-2025-52938](CVE-2025/CVE-2025-529xx/CVE-2025-52938.json) (`2025-06-23T10:15:27.857`) +- [CVE-2025-52939](CVE-2025/CVE-2025-529xx/CVE-2025-52939.json) (`2025-06-23T10:15:28.007`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2025-6019](CVE-2025/CVE-2025-60xx/CVE-2025-6019.json) (`2025-06-19T12:15:19.727`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 612f301f43f..02e224cc9fa 100644 --- a/_state.csv +++ b/_state.csv @@ -261755,7 +261755,7 @@ CVE-2024-35102,0,0,a3ac6cb938aa7738580fe72bae53eba68e5c5ac83bdf3dd07089a3c2800ee CVE-2024-35106,0,0,b3cbb527e89eeaa447d1de741b34621dea8868efaceae836286cd0a4cc5c9cc1,2025-02-11T16:15:39.913000 CVE-2024-35108,0,0,491ec2260165d7f7d3efd5be494989910741df5aa19c1bf25c8b4a132d685389,2025-04-15T17:02:50.950000 CVE-2024-35109,0,0,8d3fa27f37233d70869ab46151b8c18b411e269cb16c472303eab804df9c5c1b,2025-04-15T17:02:45.973000 -CVE-2024-3511,1,1,569cab0482d5f3732c31388dcd47849461112527e8e05df098fb1cc11f76937a,2025-06-23T09:15:21.580000 +CVE-2024-3511,0,0,569cab0482d5f3732c31388dcd47849461112527e8e05df098fb1cc11f76937a,2025-06-23T09:15:21.580000 CVE-2024-35110,0,0,5befbb4d6ff243e493eb0845590af56b30d55ebed4c9cc3628eccbae22269a4d,2025-06-10T18:32:58.057000 CVE-2024-35111,0,0,32e114bfcb14b5f1a3ca174c51aa1f1f24655b09f1f515c98299c51557856017,2025-03-04T17:45:08.987000 CVE-2024-35112,0,0,3280206f8a84b4c8489cc36e2e9cce1c1682791d1bd75d078ad6e3f08e151b0d,2025-03-04T17:43:28.240000 @@ -269837,6 +269837,7 @@ CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b7 CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000 CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303a65,2025-01-08T20:15:27.843000 CVE-2024-45346,0,0,4e7859f1333afb0d36049a9af4594d1372c3d3aedce38b6749fc0e9394a8b9a1,2025-04-08T21:15:46.533000 +CVE-2024-45347,1,1,56952cfaf2d227ea1dc3c6ad170b7ff09d15a4c626ea7709cde8de481c5eeeca,2025-06-23T10:15:26.397000 CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000 CVE-2024-4535,0,0,730361892a22ec256457579b681804af2942b6e210548a882386644617e45750,2025-05-19T18:29:41.660000 CVE-2024-45351,0,0,56eebcb116e42f563df830eca6cecb1e10730991816061db6075898908b24023,2025-03-27T16:45:27.850000 @@ -289820,6 +289821,7 @@ CVE-2025-2737,0,0,51a2c6ecf9b15b514f60378f58d17cd54247d487bf2333366f4298c4640042 CVE-2025-27370,0,0,0e4b7966e83d8d55e2eb5b8a991cbcb244993a6e600774bc55d7606305b3dc3b,2025-04-25T15:15:35.820000 CVE-2025-27371,0,0,45275223bafac4474512200e04f0e5f05b6e9358eb7647331e7f7cea3c7d0d4c,2025-04-25T15:15:35.937000 CVE-2025-2738,0,0,741400563bd4aa4fd7ad392a7491b41a388e6166253e6162b8e83ac30b8d81f7,2025-05-06T19:35:42.687000 +CVE-2025-27387,1,1,4db961ac977f5af4219f419cdb9e9590af9e77bd8f34e6ac251a8823bd75e3a2,2025-06-23T10:15:27.100000 CVE-2025-2739,0,0,de4ebff471a055f3e302ebbe8aa8af1520a646d6d985c1b37dbf5257ff28eac8,2025-05-06T19:34:57.733000 CVE-2025-27391,0,0,c782f9b884022f97c5a60c69190305dd5a13fa0bd9d3036dcc826fa9cec725bc,2025-04-09T20:02:41.860000 CVE-2025-27392,0,0,cc38f618c321afe34df80e0445ec795fd7a44f59e46f89b97dcd3422fa99fedc,2025-03-11T10:15:18.203000 @@ -298268,6 +298270,11 @@ CVE-2025-52919,0,0,6f74c19e10831d38a32e3f82b2d49209b35b6b6bdd6b9ca3f6db762bf063e CVE-2025-5292,0,0,30cec8bd4cde62e6ca85175b601b2d9fd7dc117c201a288e7f0e6414bd251b48,2025-06-02T17:32:17.397000 CVE-2025-52923,0,0,825efd0bf97043c553869930f73d387d618324b6c5d516039439c06bdeeb2fce,2025-06-22T01:15:24.097000 CVE-2025-52926,0,0,a2ea71f5f513826223184ebdf984a9517b3b97a40b47a0432cc67e7fcc0b13bd,2025-06-23T01:15:21.877000 +CVE-2025-52935,1,1,69f0a3d1fc334d25c1072a4fb7417df75df937e1592f0e78c34731ed1c3d5dec,2025-06-23T10:15:27.380000 +CVE-2025-52936,1,1,5a73b32cd0cf146bc0ee081a574067937ffe0c6a2ffedc2de43fa39d77cb9bb9,2025-06-23T10:15:27.570000 +CVE-2025-52937,1,1,781c8a33e1c2e3401be105b699a54fa188d4f995d7410721a679b6dc37fbb296,2025-06-23T10:15:27.717000 +CVE-2025-52938,1,1,32cfa0125cbed90894c155e967587051de3d80629a5cbc836d8fa783497c0b5c,2025-06-23T10:15:27.857000 +CVE-2025-52939,1,1,acb57ccf8c49d776c9ae1d73e624db6ecf3f28e9fcac64a91b7b96853d88ef7b,2025-06-23T10:15:28.007000 CVE-2025-5295,0,0,d0e6aa3b032b1532910154b10cc32ceaaf64a98256f38c6f6f628cd0a1c4bacc,2025-05-28T15:01:30.720000 CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 @@ -298771,7 +298778,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399 CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000 CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000 CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000 -CVE-2025-6019,0,1,ebf4f12bdb263a546c3aea4ef4c7f4363c6b17ec70827c011e272bb086ea941e,2025-06-19T12:15:19.727000 +CVE-2025-6019,0,0,ebf4f12bdb263a546c3aea4ef4c7f4363c6b17ec70827c011e272bb086ea941e,2025-06-19T12:15:19.727000 CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000 CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000