From ed26803442906c641ff4bccba5fe496d73f726d8 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 24 Jun 2025 16:04:16 +0000 Subject: [PATCH] Auto-Update: 2025-06-24T16:00:34.910461+00:00 --- CVE-2021/CVE-2021-14xx/CVE-2021-1470.json | 2 +- CVE-2022/CVE-2022-206xx/CVE-2022-20685.json | 2 +- CVE-2024/CVE-2024-561xx/CVE-2024-56114.json | 2 +- CVE-2025/CVE-2025-17xx/CVE-2025-1718.json | 46 +++++- CVE-2025/CVE-2025-24xx/CVE-2025-2403.json | 48 ++++++- CVE-2025/CVE-2025-278xx/CVE-2025-27827.json | 60 ++++++++ CVE-2025/CVE-2025-278xx/CVE-2025-27828.json | 60 ++++++++ CVE-2025/CVE-2025-28xx/CVE-2025-2828.json | 8 +- CVE-2025/CVE-2025-328xx/CVE-2025-32876.json | 8 +- CVE-2025/CVE-2025-328xx/CVE-2025-32879.json | 8 +- CVE-2025/CVE-2025-329xx/CVE-2025-32975.json | 64 +++++++++ CVE-2025/CVE-2025-329xx/CVE-2025-32976.json | 29 ++++ CVE-2025/CVE-2025-329xx/CVE-2025-32977.json | 64 +++++++++ CVE-2025/CVE-2025-329xx/CVE-2025-32978.json | 64 +++++++++ CVE-2025/CVE-2025-340xx/CVE-2025-34035.json | 6 +- CVE-2025/CVE-2025-340xx/CVE-2025-34036.json | 6 +- CVE-2025/CVE-2025-365xx/CVE-2025-36537.json | 56 ++++++++ CVE-2025/CVE-2025-392xx/CVE-2025-39201.json | 48 ++++++- CVE-2025/CVE-2025-392xx/CVE-2025-39202.json | 26 +++- CVE-2025/CVE-2025-392xx/CVE-2025-39203.json | 26 +++- CVE-2025/CVE-2025-392xx/CVE-2025-39204.json | 26 +++- CVE-2025/CVE-2025-392xx/CVE-2025-39205.json | 48 ++++++- CVE-2025/CVE-2025-48xx/CVE-2025-4867.json | 2 +- CVE-2025/CVE-2025-528xx/CVE-2025-52879.json | 14 +- CVE-2025/CVE-2025-53xx/CVE-2025-5318.json | 64 +++++++++ CVE-2025/CVE-2025-60xx/CVE-2025-6032.json | 60 ++++++++ CVE-2025/CVE-2025-61xx/CVE-2025-6125.json | 2 +- CVE-2025/CVE-2025-61xx/CVE-2025-6126.json | 2 +- CVE-2025/CVE-2025-61xx/CVE-2025-6127.json | 2 +- CVE-2025/CVE-2025-61xx/CVE-2025-6153.json | 2 +- CVE-2025/CVE-2025-61xx/CVE-2025-6154.json | 2 +- CVE-2025/CVE-2025-61xx/CVE-2025-6155.json | 2 +- CVE-2025/CVE-2025-61xx/CVE-2025-6156.json | 2 +- CVE-2025/CVE-2025-61xx/CVE-2025-6157.json | 2 +- CVE-2025/CVE-2025-64xx/CVE-2025-6410.json | 75 ++++++++-- CVE-2025/CVE-2025-64xx/CVE-2025-6411.json | 75 ++++++++-- CVE-2025/CVE-2025-64xx/CVE-2025-6412.json | 75 ++++++++-- CVE-2025/CVE-2025-64xx/CVE-2025-6413.json | 75 ++++++++-- CVE-2025/CVE-2025-64xx/CVE-2025-6414.json | 75 ++++++++-- CVE-2025/CVE-2025-64xx/CVE-2025-6415.json | 75 ++++++++-- CVE-2025/CVE-2025-64xx/CVE-2025-6416.json | 75 ++++++++-- CVE-2025/CVE-2025-64xx/CVE-2025-6417.json | 75 ++++++++-- CVE-2025/CVE-2025-64xx/CVE-2025-6435.json | 39 ++++- CVE-2025/CVE-2025-65xx/CVE-2025-6517.json | 10 +- CVE-2025/CVE-2025-65xx/CVE-2025-6535.json | 10 +- CVE-2025/CVE-2025-65xx/CVE-2025-6551.json | 10 +- CVE-2025/CVE-2025-65xx/CVE-2025-6567.json | 145 +++++++++++++++++++ CVE-2025/CVE-2025-65xx/CVE-2025-6568.json | 149 ++++++++++++++++++++ CVE-2025/CVE-2025-65xx/CVE-2025-6569.json | 145 +++++++++++++++++++ README.md | 80 ++++++----- _state.csv | 136 ++++++++++-------- 51 files changed, 1969 insertions(+), 218 deletions(-) create mode 100644 CVE-2025/CVE-2025-278xx/CVE-2025-27827.json create mode 100644 CVE-2025/CVE-2025-278xx/CVE-2025-27828.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32975.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32976.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32977.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32978.json create mode 100644 CVE-2025/CVE-2025-365xx/CVE-2025-36537.json create mode 100644 CVE-2025/CVE-2025-53xx/CVE-2025-5318.json create mode 100644 CVE-2025/CVE-2025-60xx/CVE-2025-6032.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6567.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6568.json create mode 100644 CVE-2025/CVE-2025-65xx/CVE-2025-6569.json diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1470.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1470.json index b65dc36b31b..212007ce47f 100644 --- a/CVE-2021/CVE-2021-14xx/CVE-2021-1470.json +++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1470.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-15T17:15:07.977", "lastModified": "2024-11-18T17:11:56.587", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json index 6f4554e0ddf..7182b0b6ff9 100644 --- a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-15T16:15:21.910", "lastModified": "2025-01-27T18:15:29.790", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json index 31b74a065c0..723c12c5bf3 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T20:15:39.730", "lastModified": "2025-01-16T19:15:28.787", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1718.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1718.json index 9b1f97ebc98..a0163206736 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1718.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1718.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1718", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2025-06-24T12:15:20.033", - "lastModified": "2025-06-24T13:15:21.547", + "lastModified": "2025-06-24T14:15:27.847", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -12,6 +12,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cybersecurity@hitachienergy.com", diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2403.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2403.json index 8d1c37056c6..ef6c481e025 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2403.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2403.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2403", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2025-06-24T12:15:20.863", - "lastModified": "2025-06-24T12:15:20.863", + "lastModified": "2025-06-24T14:15:28.330", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -12,6 +12,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cybersecurity@hitachienergy.com", @@ -38,7 +82,7 @@ "weaknesses": [ { "source": "cybersecurity@hitachienergy.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27827.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27827.json new file mode 100644 index 00000000000..6dc04a4e32a --- /dev/null +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27827.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27827", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T14:15:28.050", + "lastModified": "2025-06-24T15:15:23.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.2.0.3 could allow an unauthenticated attacker to conduct an information disclosure attack due to improper handling of session data. A successful exploit requires user interaction and could allow an attacker to access sensitive information, leading to unauthorized access to active chat rooms, reading chat data, and sending messages during an active chat session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.mitel.com/support/security-advisories", + "source": "cve@mitre.org" + }, + { + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0002-0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-278xx/CVE-2025-27828.json b/CVE-2025/CVE-2025-278xx/CVE-2025-27828.json new file mode 100644 index 00000000000..a7e1cc36570 --- /dev/null +++ b/CVE-2025/CVE-2025-278xx/CVE-2025-27828.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27828", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T14:15:28.200", + "lastModified": "2025-06-24T15:15:23.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.0.0.4, 10.1.0.0 through 10.1.0.5, and 10.2.0.0 through 10.2.0.4 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient input validation. A successful exploit requires user interaction and could allow an attacker to execute arbitrary scripts with a limited impact on the confidentiality and the integrity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.mitel.com/support/security-advisories", + "source": "cve@mitre.org" + }, + { + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0003", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2828.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2828.json index c5683288214..e9039d66bb9 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2828.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2828.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2828", "sourceIdentifier": "security@huntr.dev", "published": "2025-06-23T21:15:25.210", - "lastModified": "2025-06-23T21:15:25.210", + "lastModified": "2025-06-24T14:15:28.490", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://huntr.com/bounties/8f771040-7f34-420a-b96b-5b93d4a99afc", "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/8f771040-7f34-420a-b96b-5b93d4a99afc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32876.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32876.json index 294242a79c3..88c37bebe4c 100644 --- a/CVE-2025/CVE-2025-328xx/CVE-2025-32876.json +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32876.json @@ -2,17 +2,13 @@ "id": "CVE-2025-32876", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-20T14:15:27.877", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-20T14:15:27.877", + "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on COROS PACE 3 devices through 3.0808.0. The BLE implementation of the COROS smartwatch does not support LE Secure Connections and instead enforces BLE Legacy Pairing. In BLE Legacy Pairing, the Short-Term Key (STK) can be easily guessed. This requires knowledge of the Temporary Key (TK), which, in the case of the COROS Pace 3, is set to 0 due to the Just Works pairing method. An attacker within Bluetooth range can therefore perform sniffing attacks, allowing eavesdropping on the communication." - }, - { - "lang": "es", - "value": "Se detect\u00f3 un problema en los dispositivos COROS PACE 3 hasta la versi\u00f3n 3.0808.0. La implementaci\u00f3n BLE del reloj inteligente COROS no es compatible con las conexiones seguras LE y, en su lugar, aplica el emparejamiento heredado BLE. En el emparejamiento heredado BLE, la clave de corto plazo (STK) se puede adivinar f\u00e1cilmente. Esto requiere conocer la clave temporal (TK), que, en el caso del COROS Pace 3, est\u00e1 configurada a 0 debido al m\u00e9todo de emparejamiento Just Works. Por lo tanto, un atacante dentro del alcance de Bluetooth puede realizar ataques de rastreo, lo que permite interceptar la comunicaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32879.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32879.json index 9dce10d8bf8..580f69bf0f5 100644 --- a/CVE-2025/CVE-2025-328xx/CVE-2025-32879.json +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32879.json @@ -2,17 +2,13 @@ "id": "CVE-2025-32879", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-20T14:15:28.783", - "lastModified": "2025-06-23T20:16:40.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-20T14:15:28.783", + "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on COROS PACE 3 devices through 3.0808.0. It starts advertising if no device is connected via Bluetooth. This allows an attacker to connect with the device via BLE if no other device is connected. While connected, none of the BLE services and characteristics of the device require any authentication or security level. Therefore, any characteristic, depending on their mode of operation (read/write/notify), can be used by the connected attacker. This allows, for example, configuring the device, sending notifications, resetting the device to factory settings, or installing software." - }, - { - "lang": "es", - "value": "Se detect\u00f3 un problema en dispositivos COROS PACE 3 hasta la versi\u00f3n 3.0808.0. Este problema inicia la publicidad si no hay ning\u00fan dispositivo conectado por Bluetooth. Esto permite a un atacante conectarse al dispositivo mediante Bluetooth de baja energ\u00eda (BLE) si no hay ning\u00fan otro dispositivo conectado. Mientras est\u00e9 conectado, ninguno de los servicios ni caracter\u00edsticas de Bluetooth de este dispositivo requiere autenticaci\u00f3n ni nivel de seguridad. Por lo tanto, cualquier caracter\u00edstica, seg\u00fan su modo de funcionamiento (lectura/escritura/notificaci\u00f3n), puede ser utilizada por el atacante conectado. Esto permite, por ejemplo, configurar el dispositivo, enviar notificaciones, restablecer la configuraci\u00f3n de f\u00e1brica o instalar software." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32975.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32975.json new file mode 100644 index 00000000000..282876a0e5d --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32975.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32975", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T15:15:23.710", + "lastModified": "2025-06-24T15:15:23.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://seclists.org/fulldisclosure/2025/Jun/22", + "source": "cve@mitre.org" + }, + { + "url": "https://seralys.com/research/CVE-2025-32975.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32976.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32976.json new file mode 100644 index 00000000000..d38b256f36d --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32976.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-32976", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T15:15:23.930", + "lastModified": "2025-06-24T15:15:23.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains a logic flaw in its two-factor authentication implementation that allows authenticated users to bypass TOTP-based 2FA requirements. The vulnerability exists in the 2FA validation process and can be exploited to gain elevated access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://seclists.org/fulldisclosure/2025/Jun/23", + "source": "cve@mitre.org" + }, + { + "url": "https://seralys.com/research/CVE-2025-32976.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32977.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32977.json new file mode 100644 index 00000000000..c18bf5763e9 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32977.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32977", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T15:15:24.063", + "lastModified": "2025-06-24T15:15:24.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to upload backup files to the system. While signature validation is implemented, weaknesses in the validation process can be exploited to upload malicious backup content that could compromise system integrity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://seclists.org/fulldisclosure/2025/Jun/24", + "source": "cve@mitre.org" + }, + { + "url": "https://seralys.com/research/CVE-2025-32977.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32978.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32978.json new file mode 100644 index 00000000000..3a34de8a1a8 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32978.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32978", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-24T15:15:24.260", + "lastModified": "2025-06-24T15:15:24.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://seclists.org/fulldisclosure/2025/Jun/25", + "source": "cve@mitre.org" + }, + { + "url": "https://seralys.com/research/CVE-2025-32978.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://support.quest.com/kb/4379499/quest-response-to-kace-sma-vulnerabilities-cve-2025-32975-cve-2025-32976-cve-2025-32977-cve-2025-32978", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34035.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34035.json index 402802043f5..c02969e4018 100644 --- a/CVE-2025/CVE-2025-340xx/CVE-2025-34035.json +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34035.json @@ -2,7 +2,7 @@ "id": "CVE-2025-34035", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-06-24T01:15:24.763", - "lastModified": "2025-06-24T03:15:33.293", + "lastModified": "2025-06-24T14:15:28.820", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -93,6 +93,10 @@ { "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php", "source": "disclosure@vulncheck.com" + }, + { + "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-340xx/CVE-2025-34036.json b/CVE-2025/CVE-2025-340xx/CVE-2025-34036.json index 7cacdc3e59e..1333476b8a2 100644 --- a/CVE-2025/CVE-2025-340xx/CVE-2025-34036.json +++ b/CVE-2025/CVE-2025-340xx/CVE-2025-34036.json @@ -2,7 +2,7 @@ "id": "CVE-2025-34036", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-06-24T01:15:24.903", - "lastModified": "2025-06-24T01:15:24.903", + "lastModified": "2025-06-24T14:15:28.953", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -85,6 +85,10 @@ { "url": "https://www.exploit-db.com/exploits/39596", "source": "disclosure@vulncheck.com" + }, + { + "url": "https://web.archive.org/web/20160322204109/http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-365xx/CVE-2025-36537.json b/CVE-2025/CVE-2025-365xx/CVE-2025-36537.json new file mode 100644 index 00000000000..ab762b21b2f --- /dev/null +++ b/CVE-2025/CVE-2025-365xx/CVE-2025-36537.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-36537", + "sourceIdentifier": "psirt@teamviewer.com", + "published": "2025-06-24T15:15:24.453", + "lastModified": "2025-06-24T15:15:24.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Permission Assignment for Critical Resource in the TeamViewer Client (Full and Host) of TeamViewer Remote and Tensor prior Version 15.67 on Windows allows a local unprivileged user to trigger arbitrary file deletion with SYSTEM privileges via leveraging the MSI rollback mechanism. The vulnerability only applies to the Remote Management features: Backup, Monitoring, and Patch Management." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@teamviewer.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1002/", + "source": "psirt@teamviewer.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-392xx/CVE-2025-39201.json b/CVE-2025/CVE-2025-392xx/CVE-2025-39201.json index b8a163b2497..bc4dc1f50ec 100644 --- a/CVE-2025/CVE-2025-392xx/CVE-2025-39201.json +++ b/CVE-2025/CVE-2025-392xx/CVE-2025-39201.json @@ -2,7 +2,7 @@ "id": "CVE-2025-39201", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2025-06-24T12:15:21.050", - "lastModified": "2025-06-24T12:15:21.050", + "lastModified": "2025-06-24T14:15:29.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -12,6 +12,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cybersecurity@hitachienergy.com", @@ -38,7 +82,7 @@ "weaknesses": [ { "source": "cybersecurity@hitachienergy.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-392xx/CVE-2025-39202.json b/CVE-2025/CVE-2025-392xx/CVE-2025-39202.json index c0b9aaf6ccb..130f9c6a854 100644 --- a/CVE-2025/CVE-2025-392xx/CVE-2025-39202.json +++ b/CVE-2025/CVE-2025-392xx/CVE-2025-39202.json @@ -2,7 +2,7 @@ "id": "CVE-2025-39202", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2025-06-24T12:15:21.200", - "lastModified": "2025-06-24T12:15:21.200", + "lastModified": "2025-06-24T14:15:29.253", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,12 +55,34 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } ] }, "weaknesses": [ { "source": "cybersecurity@hitachienergy.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-392xx/CVE-2025-39203.json b/CVE-2025/CVE-2025-392xx/CVE-2025-39203.json index cf2a263df5c..2e8b199ab54 100644 --- a/CVE-2025/CVE-2025-392xx/CVE-2025-39203.json +++ b/CVE-2025/CVE-2025-392xx/CVE-2025-39203.json @@ -2,7 +2,7 @@ "id": "CVE-2025-39203", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2025-06-24T12:15:21.380", - "lastModified": "2025-06-24T12:15:21.380", + "lastModified": "2025-06-24T14:15:29.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,12 +55,34 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ { "source": "cybersecurity@hitachienergy.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-392xx/CVE-2025-39204.json b/CVE-2025/CVE-2025-392xx/CVE-2025-39204.json index 9bcd953a30e..7f382865f23 100644 --- a/CVE-2025/CVE-2025-392xx/CVE-2025-39204.json +++ b/CVE-2025/CVE-2025-392xx/CVE-2025-39204.json @@ -2,7 +2,7 @@ "id": "CVE-2025-39204", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2025-06-24T12:15:21.523", - "lastModified": "2025-06-24T12:15:21.523", + "lastModified": "2025-06-24T14:15:29.553", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,12 +55,34 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ { "source": "cybersecurity@hitachienergy.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-392xx/CVE-2025-39205.json b/CVE-2025/CVE-2025-392xx/CVE-2025-39205.json index 94a1b2feea1..78a70b3a33d 100644 --- a/CVE-2025/CVE-2025-392xx/CVE-2025-39205.json +++ b/CVE-2025/CVE-2025-392xx/CVE-2025-39205.json @@ -2,7 +2,7 @@ "id": "CVE-2025-39205", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2025-06-24T13:15:22.470", - "lastModified": "2025-06-24T13:15:22.470", + "lastModified": "2025-06-24T14:15:29.707", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -12,6 +12,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@hitachienergy.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cybersecurity@hitachienergy.com", @@ -38,7 +82,7 @@ "weaknesses": [ { "source": "cybersecurity@hitachienergy.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-48xx/CVE-2025-4867.json b/CVE-2025/CVE-2025-48xx/CVE-2025-4867.json index a037a655b44..d500da3e4b3 100644 --- a/CVE-2025/CVE-2025-48xx/CVE-2025-4867.json +++ b/CVE-2025/CVE-2025-48xx/CVE-2025-4867.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-05-18T09:15:17.927", "lastModified": "2025-05-19T13:35:20.460", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-528xx/CVE-2025-52879.json b/CVE-2025/CVE-2025-528xx/CVE-2025-52879.json index 67601767c97..8353ba76426 100644 --- a/CVE-2025/CVE-2025-528xx/CVE-2025-52879.json +++ b/CVE-2025/CVE-2025-528xx/CVE-2025-52879.json @@ -2,8 +2,8 @@ "id": "CVE-2025-52879", "sourceIdentifier": "cve@jetbrains.com", "published": "2025-06-23T15:15:28.933", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T15:15:25.180", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-53xx/CVE-2025-5318.json b/CVE-2025/CVE-2025-53xx/CVE-2025-5318.json new file mode 100644 index 00000000000..8c4061d0ec9 --- /dev/null +++ b/CVE-2025/CVE-2025-53xx/CVE-2025-5318.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-5318", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-24T14:15:30.523", + "lastModified": "2025-06-24T14:15:30.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-5318", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369131", + "source": "secalert@redhat.com" + }, + { + "url": "https://www.libssh.org/security/advisories/CVE-2025-5318.txt", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6032.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6032.json new file mode 100644 index 00000000000..def6af1ceae --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6032.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6032", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-06-24T14:15:30.703", + "lastModified": "2025-06-24T14:15:30.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-6032", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372501", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6125.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6125.json index 8278c7fb256..83089991ee9 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6125.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6125.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T14:15:22.960", "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6126.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6126.json index 7398f49eaef..5f8df50c8ec 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6126.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6126.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T15:15:25.327", "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6127.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6127.json index 7b4df4396d3..b3b04445de0 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6127.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6127.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-16T15:15:25.510", "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6153.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6153.json index 20309401c4a..405784a43c2 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6153.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6153.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T03:15:25.743", "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6154.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6154.json index 0a4a71317a8..bb95a1d9e79 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6154.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T03:15:25.947", "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6155.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6155.json index 3210b1d94f2..e7efaa56882 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6155.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6155.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T03:15:26.147", "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6156.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6156.json index 3fbff83e522..b41d7d990fc 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6156.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T03:15:26.340", "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-61xx/CVE-2025-6157.json b/CVE-2025/CVE-2025-61xx/CVE-2025-6157.json index 99824e59de0..2de10353d05 100644 --- a/CVE-2025/CVE-2025-61xx/CVE-2025-6157.json +++ b/CVE-2025/CVE-2025-61xx/CVE-2025-6157.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-17T03:15:26.553", "lastModified": "2025-06-17T20:50:23.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6410.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6410.json index 5d055bec08d..beea0959645 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6410.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6410.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6410", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T17:15:23.580", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T14:51:28.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/83", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313404", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313404", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.598226", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/83", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6411.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6411.json index 027d2aea4a6..00b42b5b547 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6411.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6411.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6411", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T17:15:23.800", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T14:51:00.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/84", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313405", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313405", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.598227", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/84", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6412.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6412.json index b0df45f0e74..7693c364488 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6412.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6412.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6412", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T18:15:23.830", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T14:45:30.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/85", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313406", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313406", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.598228", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/85", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6413.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6413.json index 238b5184fe4..7126e93a6b2 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6413.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6413.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6413", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T18:15:24.720", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T14:44:44.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/86", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313407", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313407", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.598229", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/86", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6414.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6414.json index 4dab1093a41..e77be2be85a 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6414.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6414.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6414", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T19:15:22.377", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T14:43:54.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/87", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313408", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313408", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.598230", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/87", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6415.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6415.json index 9e78a68c0f6..584a12c544f 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6415.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6415.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6415", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T19:15:22.583", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T14:42:25.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/88", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313409", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313409", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.598231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/88", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6416.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6416.json index 3420fd66a1d..1f57410650f 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6416.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6416.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6416", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T20:15:26.237", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T14:42:10.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/89", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313410", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313410", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.598232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/89", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6417.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6417.json index a800a6d106a..226fbb03bfe 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6417.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6417.json @@ -2,8 +2,8 @@ "id": "CVE-2025-6417", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-21T20:15:27.210", - "lastModified": "2025-06-23T20:16:21.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-24T14:41:39.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3723A3BE-7EF5-4766-87DF-C7E18185322F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/f1rstb100d/myCVE/issues/90", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.313411", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.313411", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.598233", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/f1rstb100d/myCVE/issues/90", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6435.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6435.json index 22a617f99d1..d3df116f0b6 100644 --- a/CVE-2025/CVE-2025-64xx/CVE-2025-6435.json +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6435.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6435", "sourceIdentifier": "security@mozilla.org", "published": "2025-06-24T13:15:24.560", - "lastModified": "2025-06-24T13:15:24.560", + "lastModified": "2025-06-24T14:15:30.930", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1950056", diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6517.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6517.json index 360b1114f0f..8fad958ee5a 100644 --- a/CVE-2025/CVE-2025-65xx/CVE-2025-6517.json +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6517.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6517", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-23T18:15:22.797", - "lastModified": "2025-06-23T20:16:21.633", + "lastModified": "2025-06-24T14:15:31.093", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.593111", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/honorseclab/vulns/blob/main/dromara_MaxKey/SSRF.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6535.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6535.json index 92e6b955e84..ac883ef9367 100644 --- a/CVE-2025/CVE-2025-65xx/CVE-2025-6535.json +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6535.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6535", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-24T01:15:25.513", - "lastModified": "2025-06-24T01:15:25.513", + "lastModified": "2025-06-24T14:15:31.237", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.596573", "source": "cna@vuldb.com" + }, + { + "url": "https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6551.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6551.json index 957c5ad31c5..0a48d3d8c0a 100644 --- a/CVE-2025/CVE-2025-65xx/CVE-2025-6551.json +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6551.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6551", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-24T02:15:23.170", - "lastModified": "2025-06-24T02:15:23.170", + "lastModified": "2025-06-24T14:15:31.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.596615", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6567.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6567.json new file mode 100644 index 00000000000..ef995b7952d --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6567.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6567", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-24T15:15:25.623", + "lastModified": "2025-06-24T15:15:25.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file Recruitment/admin/view_application.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Sp1d3rL1/CVE/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313739", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313739", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.601339", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.campcodes.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6568.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6568.json new file mode 100644 index 00000000000..44e25472443 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6568.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6568", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-24T15:15:25.823", + "lastModified": "2025-06-24T15:15:25.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formIpv6Setup of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/d2pq/cve/blob/main/616/23.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/d2pq/cve/blob/main/616/23.md#poc", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313740", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313740", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.601344", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-65xx/CVE-2025-6569.json b/CVE-2025/CVE-2025-65xx/CVE-2025-6569.json new file mode 100644 index 00000000000..01e153b1900 --- /dev/null +++ b/CVE-2025/CVE-2025-65xx/CVE-2025-6569.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6569", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-24T15:15:26.017", + "lastModified": "2025-06-24T15:15:26.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in code-projects School Fees Payment System 1.0. Affected by this vulnerability is an unknown functionality of the file /student.php. The manipulation of the argument sname/contact/about/emailid/transcation_remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/tuooo/CVE/issues/18", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313741", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313741", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.601612", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6c68ae42450..402c3ab3688 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-24T14:00:22.892829+00:00 +2025-06-24T16:00:34.910461+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-24T13:47:04.127000+00:00 +2025-06-24T15:15:26.017000+00:00 ``` ### Last Data Feed Release @@ -33,52 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299207 +299219 ``` ### CVEs added in the last Commit -Recently added CVEs: `22` +Recently added CVEs: `12` -- [CVE-2025-1718](CVE-2025/CVE-2025-17xx/CVE-2025-1718.json) (`2025-06-24T12:15:20.033`) -- [CVE-2025-2403](CVE-2025/CVE-2025-24xx/CVE-2025-2403.json) (`2025-06-24T12:15:20.863`) -- [CVE-2025-39201](CVE-2025/CVE-2025-392xx/CVE-2025-39201.json) (`2025-06-24T12:15:21.050`) -- [CVE-2025-39202](CVE-2025/CVE-2025-392xx/CVE-2025-39202.json) (`2025-06-24T12:15:21.200`) -- [CVE-2025-39203](CVE-2025/CVE-2025-392xx/CVE-2025-39203.json) (`2025-06-24T12:15:21.380`) -- [CVE-2025-39204](CVE-2025/CVE-2025-392xx/CVE-2025-39204.json) (`2025-06-24T12:15:21.523`) -- [CVE-2025-39205](CVE-2025/CVE-2025-392xx/CVE-2025-39205.json) (`2025-06-24T13:15:22.470`) -- [CVE-2025-6424](CVE-2025/CVE-2025-64xx/CVE-2025-6424.json) (`2025-06-24T13:15:23.273`) -- [CVE-2025-6425](CVE-2025/CVE-2025-64xx/CVE-2025-6425.json) (`2025-06-24T13:15:23.403`) -- [CVE-2025-6426](CVE-2025/CVE-2025-64xx/CVE-2025-6426.json) (`2025-06-24T13:15:23.537`) -- [CVE-2025-6427](CVE-2025/CVE-2025-64xx/CVE-2025-6427.json) (`2025-06-24T13:15:23.650`) -- [CVE-2025-6428](CVE-2025/CVE-2025-64xx/CVE-2025-6428.json) (`2025-06-24T13:15:23.770`) -- [CVE-2025-6429](CVE-2025/CVE-2025-64xx/CVE-2025-6429.json) (`2025-06-24T13:15:23.877`) -- [CVE-2025-6430](CVE-2025/CVE-2025-64xx/CVE-2025-6430.json) (`2025-06-24T13:15:23.993`) -- [CVE-2025-6431](CVE-2025/CVE-2025-64xx/CVE-2025-6431.json) (`2025-06-24T13:15:24.103`) -- [CVE-2025-6432](CVE-2025/CVE-2025-64xx/CVE-2025-6432.json) (`2025-06-24T13:15:24.220`) -- [CVE-2025-6433](CVE-2025/CVE-2025-64xx/CVE-2025-6433.json) (`2025-06-24T13:15:24.327`) -- [CVE-2025-6434](CVE-2025/CVE-2025-64xx/CVE-2025-6434.json) (`2025-06-24T13:15:24.447`) -- [CVE-2025-6435](CVE-2025/CVE-2025-64xx/CVE-2025-6435.json) (`2025-06-24T13:15:24.560`) -- [CVE-2025-6436](CVE-2025/CVE-2025-64xx/CVE-2025-6436.json) (`2025-06-24T13:15:24.677`) -- [CVE-2025-6565](CVE-2025/CVE-2025-65xx/CVE-2025-6565.json) (`2025-06-24T13:15:24.790`) -- [CVE-2025-6566](CVE-2025/CVE-2025-65xx/CVE-2025-6566.json) (`2025-06-24T13:15:25.057`) +- [CVE-2025-27827](CVE-2025/CVE-2025-278xx/CVE-2025-27827.json) (`2025-06-24T14:15:28.050`) +- [CVE-2025-27828](CVE-2025/CVE-2025-278xx/CVE-2025-27828.json) (`2025-06-24T14:15:28.200`) +- [CVE-2025-32975](CVE-2025/CVE-2025-329xx/CVE-2025-32975.json) (`2025-06-24T15:15:23.710`) +- [CVE-2025-32976](CVE-2025/CVE-2025-329xx/CVE-2025-32976.json) (`2025-06-24T15:15:23.930`) +- [CVE-2025-32977](CVE-2025/CVE-2025-329xx/CVE-2025-32977.json) (`2025-06-24T15:15:24.063`) +- [CVE-2025-32978](CVE-2025/CVE-2025-329xx/CVE-2025-32978.json) (`2025-06-24T15:15:24.260`) +- [CVE-2025-36537](CVE-2025/CVE-2025-365xx/CVE-2025-36537.json) (`2025-06-24T15:15:24.453`) +- [CVE-2025-5318](CVE-2025/CVE-2025-53xx/CVE-2025-5318.json) (`2025-06-24T14:15:30.523`) +- [CVE-2025-6032](CVE-2025/CVE-2025-60xx/CVE-2025-6032.json) (`2025-06-24T14:15:30.703`) +- [CVE-2025-6567](CVE-2025/CVE-2025-65xx/CVE-2025-6567.json) (`2025-06-24T15:15:25.623`) +- [CVE-2025-6568](CVE-2025/CVE-2025-65xx/CVE-2025-6568.json) (`2025-06-24T15:15:25.823`) +- [CVE-2025-6569](CVE-2025/CVE-2025-65xx/CVE-2025-6569.json) (`2025-06-24T15:15:26.017`) ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `37` -- [CVE-2023-1932](CVE-2023/CVE-2023-19xx/CVE-2023-1932.json) (`2025-06-24T13:07:42.087`) -- [CVE-2024-47796](CVE-2024/CVE-2024-477xx/CVE-2024-47796.json) (`2025-06-24T13:47:04.127`) -- [CVE-2024-51379](CVE-2024/CVE-2024-513xx/CVE-2024-51379.json) (`2025-06-24T13:28:19.803`) -- [CVE-2024-51380](CVE-2024/CVE-2024-513xx/CVE-2024-51380.json) (`2025-06-24T13:22:14.297`) -- [CVE-2024-51381](CVE-2024/CVE-2024-513xx/CVE-2024-51381.json) (`2025-06-24T13:20:52.710`) -- [CVE-2024-51382](CVE-2024/CVE-2024-513xx/CVE-2024-51382.json) (`2025-06-24T13:13:53.583`) -- [CVE-2024-51504](CVE-2024/CVE-2024-515xx/CVE-2024-51504.json) (`2025-06-24T12:27:49.960`) -- [CVE-2024-52333](CVE-2024/CVE-2024-523xx/CVE-2024-52333.json) (`2025-06-24T13:44:55.670`) -- [CVE-2025-3576](CVE-2025/CVE-2025-35xx/CVE-2025-3576.json) (`2025-06-24T13:15:22.657`) -- [CVE-2025-48797](CVE-2025/CVE-2025-487xx/CVE-2025-48797.json) (`2025-06-24T13:15:22.917`) -- [CVE-2025-48798](CVE-2025/CVE-2025-487xx/CVE-2025-48798.json) (`2025-06-24T13:15:23.123`) +- [CVE-2025-39203](CVE-2025/CVE-2025-392xx/CVE-2025-39203.json) (`2025-06-24T14:15:29.410`) +- [CVE-2025-39204](CVE-2025/CVE-2025-392xx/CVE-2025-39204.json) (`2025-06-24T14:15:29.553`) +- [CVE-2025-39205](CVE-2025/CVE-2025-392xx/CVE-2025-39205.json) (`2025-06-24T14:15:29.707`) +- [CVE-2025-4867](CVE-2025/CVE-2025-48xx/CVE-2025-4867.json) (`2025-05-19T13:35:20.460`) +- [CVE-2025-52879](CVE-2025/CVE-2025-528xx/CVE-2025-52879.json) (`2025-06-24T15:15:25.180`) +- [CVE-2025-6125](CVE-2025/CVE-2025-61xx/CVE-2025-6125.json) (`2025-06-17T20:50:23.507`) +- [CVE-2025-6126](CVE-2025/CVE-2025-61xx/CVE-2025-6126.json) (`2025-06-17T20:50:23.507`) +- [CVE-2025-6127](CVE-2025/CVE-2025-61xx/CVE-2025-6127.json) (`2025-06-17T20:50:23.507`) +- [CVE-2025-6153](CVE-2025/CVE-2025-61xx/CVE-2025-6153.json) (`2025-06-17T20:50:23.507`) +- [CVE-2025-6154](CVE-2025/CVE-2025-61xx/CVE-2025-6154.json) (`2025-06-17T20:50:23.507`) +- [CVE-2025-6155](CVE-2025/CVE-2025-61xx/CVE-2025-6155.json) (`2025-06-17T20:50:23.507`) +- [CVE-2025-6156](CVE-2025/CVE-2025-61xx/CVE-2025-6156.json) (`2025-06-17T20:50:23.507`) +- [CVE-2025-6157](CVE-2025/CVE-2025-61xx/CVE-2025-6157.json) (`2025-06-17T20:50:23.507`) +- [CVE-2025-6410](CVE-2025/CVE-2025-64xx/CVE-2025-6410.json) (`2025-06-24T14:51:28.207`) +- [CVE-2025-6411](CVE-2025/CVE-2025-64xx/CVE-2025-6411.json) (`2025-06-24T14:51:00.910`) +- [CVE-2025-6412](CVE-2025/CVE-2025-64xx/CVE-2025-6412.json) (`2025-06-24T14:45:30.210`) +- [CVE-2025-6413](CVE-2025/CVE-2025-64xx/CVE-2025-6413.json) (`2025-06-24T14:44:44.467`) +- [CVE-2025-6414](CVE-2025/CVE-2025-64xx/CVE-2025-6414.json) (`2025-06-24T14:43:54.553`) +- [CVE-2025-6415](CVE-2025/CVE-2025-64xx/CVE-2025-6415.json) (`2025-06-24T14:42:25.020`) +- [CVE-2025-6416](CVE-2025/CVE-2025-64xx/CVE-2025-6416.json) (`2025-06-24T14:42:10.153`) +- [CVE-2025-6417](CVE-2025/CVE-2025-64xx/CVE-2025-6417.json) (`2025-06-24T14:41:39.197`) +- [CVE-2025-6435](CVE-2025/CVE-2025-64xx/CVE-2025-6435.json) (`2025-06-24T14:15:30.930`) +- [CVE-2025-6517](CVE-2025/CVE-2025-65xx/CVE-2025-6517.json) (`2025-06-24T14:15:31.093`) +- [CVE-2025-6535](CVE-2025/CVE-2025-65xx/CVE-2025-6535.json) (`2025-06-24T14:15:31.237`) +- [CVE-2025-6551](CVE-2025/CVE-2025-65xx/CVE-2025-6551.json) (`2025-06-24T14:15:31.390`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d5d82a8f67a..7a86cb842b1 100644 --- a/_state.csv +++ b/_state.csv @@ -166187,7 +166187,7 @@ CVE-2021-1466,0,0,73d1ab1dba7b93614d4456f7c4154a9051b3311fd597548613460e253f8816 CVE-2021-1467,0,0,37cd1b0388d59a074ae1b248547247cab652ecdcf418f496874b46d7894f4fea,2024-11-21T05:44:25.383000 CVE-2021-1468,0,0,94dddc2bb33a1a5bbdd2a5ca364627e60173fbecdf4e1a69011a7fe666c23acd,2024-11-21T05:44:25.520000 CVE-2021-1469,0,0,a249832e104b4956ca7a008b4b77116e8fcef6bd075ba8cd8efd905250eb8669,2024-11-21T05:44:25.653000 -CVE-2021-1470,0,0,b19148fbd05428a7d79b2eb78a799c57c7354cff2b4c3978a4cd26e7b68edaba,2024-11-18T17:11:56.587000 +CVE-2021-1470,0,1,09e4dd6b2e446f18539553f94e26fb568c68e227569336aba0d18492575bb1fa,2024-11-18T17:11:56.587000 CVE-2021-1471,0,0,d8e00b3f829fdaca83472335b9607fb434f6533d18f09e893d5e153481995271,2024-11-21T05:44:25.900000 CVE-2021-1472,0,0,cb714db37398c37a1853461ae4302afc31c17d76f152f27fa18411a5240b948b,2024-11-21T05:44:26.040000 CVE-2021-1473,0,0,d51b1ce3c7393305aafcc238a46d576cb7b56fe45fcc65110bb32c966ff5cc45,2024-11-21T05:44:26.183000 @@ -190604,7 +190604,7 @@ CVE-2022-20681,0,0,280bf92419fd301fbd908288efb43ca833598900fb53a9b6250a1ec7dddf6 CVE-2022-20682,0,0,1fa71ee857c33f00b556e052007e94caeb65b734be0c94eb81a75c820f03cb63,2024-11-21T06:43:18.730000 CVE-2022-20683,0,0,8bc8a3d3cd8a40fc693531753717605296f704be039710d68f204e467f0b5ea0,2024-11-21T06:43:18.867000 CVE-2022-20684,0,0,ab63b4c838f302c6526c81b8e341f0cfda8c2f5e8bb923caf295f3412a9c5f06,2024-11-21T06:43:19.027000 -CVE-2022-20685,0,0,500acd8f1d43926f0473c0f9c1ad055cef4f8bcf6dada43df171deec7fa1cdce,2025-01-27T18:15:29.790000 +CVE-2022-20685,0,1,930be8372472d203f80fb02efe0d59c887f0f68be43d0a352ad378ebbe4db2f1,2025-01-27T18:15:29.790000 CVE-2022-20686,0,0,600b7ff1394c351d716cddf546c26028d7ecb7ef8b18801ac32a7123861efb3c,2024-11-21T06:43:19.270000 CVE-2022-20687,0,0,5d18dbdb3617cc3203763429f5c75eebd258fe4458168c096533f5288bbfb8f0,2024-11-21T06:43:19.417000 CVE-2022-20688,0,0,6528ed176b6b729cf5d0d6c83ec1e5efbd5de1b84c9c813ad67aa56478111cbb,2024-11-21T06:43:19.557000 @@ -216552,7 +216552,7 @@ CVE-2023-1928,0,0,8763c818f493e7271a7087e59be9778bb487db7538d460e423ab7153b6d87e CVE-2023-1929,0,0,204c57af056c484d5462acf184d2d8cd9606d5fba79de55bddd06a7bd216efe8,2024-11-21T07:40:09.467000 CVE-2023-1930,0,0,c8e908b38326d5b4768b11783dc2c91330770349492af5fc20a4ad3bddbab7b8,2024-11-21T07:40:09.570000 CVE-2023-1931,0,0,0b288b22bb931e38df7fce760f61fdcf70cd6b924be176d1f6a2a1416a4b0ebd,2024-11-21T07:40:09.670000 -CVE-2023-1932,0,1,47a066350b4f3c7af8c5bca8c9e72e8a22b5fbbd242580e75ffd53ad0e4afa44,2025-06-24T13:07:42.087000 +CVE-2023-1932,0,0,47a066350b4f3c7af8c5bca8c9e72e8a22b5fbbd242580e75ffd53ad0e4afa44,2025-06-24T13:07:42.087000 CVE-2023-1934,0,0,1969e80b4d23640cff91a76a5a1f40d91535e51ecd25ec64ce83f2b09cebf529,2025-02-13T17:16:00.967000 CVE-2023-1935,0,0,ef36ae8e60a399ff6480df6d7ac2a28a7a5d41184ed75ae8a4bccc47508f9fea,2024-11-21T07:40:09.973000 CVE-2023-1936,0,0,04e4ee886165d2604590b79afe266663161903b8f56eed90e8ad2e74b29f605c,2024-11-21T07:40:10.853000 @@ -271705,7 +271705,7 @@ CVE-2024-47791,0,0,71a59e4b7f657785b7efb1d1c710d18d9ab869da4b56d86c25790c7b8675e CVE-2024-47793,0,0,882b9f21365001a1bbe1427d7ecd7686f09cb53c26df041c802a57c5badf616d,2024-10-21T21:25:36.697000 CVE-2024-47794,0,0,5f08b59a295e74bd759bb3415b51927fbe86f46c8a55f75f87047c201f0f2904,2025-01-11T13:15:22.390000 CVE-2024-47795,0,0,10e9418b0b5a0bf5163545d663192273bb472168c5c5fefe85382cb82093049c,2025-05-16T14:43:56.797000 -CVE-2024-47796,0,1,03d29b641c26b81d3c5622c5eee6943c23acfb19588990f033695e199f730d96,2025-06-24T13:47:04.127000 +CVE-2024-47796,0,0,03d29b641c26b81d3c5622c5eee6943c23acfb19588990f033695e199f730d96,2025-06-24T13:47:04.127000 CVE-2024-47797,0,0,1db7c191d78a0c4eb63d4cdd8fe193396dc3e7794237bd9d846daea68af0e9f7,2024-11-06T15:24:53.210000 CVE-2024-47799,0,0,c3938335baae6d700a63faf82e2306985214819a9aa9e9a31818efb7cbeda4db,2024-11-12T13:55:21.227000 CVE-2024-4780,0,0,d587053157d7c17d807fe8569feada4a245f1bae752836389b387fd0d926bac1,2024-11-21T09:43:35.980000 @@ -274259,11 +274259,11 @@ CVE-2024-5137,0,0,14cc0e878710b854541124ba59367506c2de95b027aa7063332dbde02ef14e CVE-2024-51376,0,0,f700ac102ba582e72dbdc7fed72c59b433027ff0357273ca7f73e1576035ebe0,2025-02-13T21:15:15.083000 CVE-2024-51377,0,0,454a574f7d41cec5c0e5592441622f9e1eef9cc67c58f07bfdfa7571c5635b7b,2024-11-14T23:23:52.997000 CVE-2024-51378,0,0,60b518476e0f52f1f42de1d9edd060a172f8f183ad7a51b636d39c5e7781b145,2024-12-06T18:17:17.377000 -CVE-2024-51379,0,1,200743168a58cf06cbc21ee80028535533bc9bb74492051502e8c5fff5286cff,2025-06-24T13:28:19.803000 +CVE-2024-51379,0,0,200743168a58cf06cbc21ee80028535533bc9bb74492051502e8c5fff5286cff,2025-06-24T13:28:19.803000 CVE-2024-5138,0,0,140f774b20fa807afb7fb688713e1cf4fd50bd4b8c4c7cf0bda80526ec06f84f,2024-11-21T09:47:03.263000 -CVE-2024-51380,0,1,29d60b6fd2ac7c648bf078ce05d2242586dad9e027af28bd62240a434d3c55fb,2025-06-24T13:22:14.297000 -CVE-2024-51381,0,1,ec2f6b9867725fdc19efd7a1013e38218fbe428ee1337cbf0242dc13d601bd43,2025-06-24T13:20:52.710000 -CVE-2024-51382,0,1,63e400f9d77f048ee2deef865d5f75efebba7225ec79595bcabf65e0fd3658e7,2025-06-24T13:13:53.583000 +CVE-2024-51380,0,0,29d60b6fd2ac7c648bf078ce05d2242586dad9e027af28bd62240a434d3c55fb,2025-06-24T13:22:14.297000 +CVE-2024-51381,0,0,ec2f6b9867725fdc19efd7a1013e38218fbe428ee1337cbf0242dc13d601bd43,2025-06-24T13:20:52.710000 +CVE-2024-51382,0,0,63e400f9d77f048ee2deef865d5f75efebba7225ec79595bcabf65e0fd3658e7,2025-06-24T13:13:53.583000 CVE-2024-51392,0,0,c28913cf9578463f4763dccada8773c2d0b70c039999d2c8d3d568551fd804da,2025-05-30T16:31:03.107000 CVE-2024-51398,0,0,cea8f8f4881380dbaa2cfe732dffbd060c56c48b06b04f4d982be54dbdad46e4,2024-11-05T18:35:17.420000 CVE-2024-51399,0,0,7797cfea236d02f4c030090ec48621397eecdb65349aff9b28f04a876b406896,2024-11-05T18:35:18.260000 @@ -274343,7 +274343,7 @@ CVE-2024-51500,0,0,9f79bcd5037557dd7e0cb267397d832d1535c16ed992bdeffa51cc73eef4d CVE-2024-51501,0,0,b585036c51d67ee5dc1d50b01aef95445cf1220ae53ecc21ca9038c2aa3d0733,2024-11-08T16:15:50.200000 CVE-2024-51502,0,0,d7dbefbfb53dbcc55361828d1af8973baaef8a002ed3b6e965f9f646792737a2,2024-11-21T17:15:22.737000 CVE-2024-51503,0,0,e1b49616d4a00e7d7d3cfa9d7aea7e4c02706f35f12a6b64bc3311e1675452c3,2024-11-19T21:56:45.533000 -CVE-2024-51504,0,1,18454e061ade7d61b8dd21d70902e9da78dc1967ff68c671bd62b476c8e160fd,2025-06-24T12:27:49.960000 +CVE-2024-51504,0,0,18454e061ade7d61b8dd21d70902e9da78dc1967ff68c671bd62b476c8e160fd,2025-06-24T12:27:49.960000 CVE-2024-51505,0,0,59a9c27ff1aa6293764a1805d129d78b3200f41b807deae85bed614c1c751bd1,2025-02-18T18:15:26.420000 CVE-2024-51506,0,0,0f188b847dff5756f20c14ac8f67f7dd3df9f93024ac2a0910692ac01579c55b,2025-06-03T14:53:08.277000 CVE-2024-51507,0,0,30943843e052c701df27f4a2af3e73dbcc49ed636de642936e8481f479bbdf57,2025-06-03T14:55:25.300000 @@ -274989,7 +274989,7 @@ CVE-2024-5233,0,0,749403088352361e2986fc2566426aafc544613446ac5fd3ac82ce8b947196 CVE-2024-52330,0,0,b205d5d2afaa38c34428a1eeef7e76ca6fed50de8ad2e5a1eac6a8c24e6f1ff8,2025-01-23T17:15:14.427000 CVE-2024-52331,0,0,180e174e5208ca4d900653122ec4e97c4ab3215251616b3d737907effe366848,2025-01-23T17:15:14.563000 CVE-2024-52332,0,0,58837c5feb4aa8da96238f281eca729502def4e6f29469edf4244234ba0fc606,2025-01-11T13:15:25.070000 -CVE-2024-52333,0,1,b7d0f71813f948324a406290fa6ccd1c978c2190104ced6f812939e57d54f6b3,2025-06-24T13:44:55.670000 +CVE-2024-52333,0,0,b7d0f71813f948324a406290fa6ccd1c978c2190104ced6f812939e57d54f6b3,2025-06-24T13:44:55.670000 CVE-2024-52335,0,0,dd4f62d353da42f6dc7115815924c982f0175669a07ab002418fb12d6de291f2,2024-12-06T14:15:21.230000 CVE-2024-52336,0,0,b6e9b11addff6749adae872dd38056b35e5782b328e6ea56a9be94620e0c21ab,2025-02-03T20:15:33.123000 CVE-2024-52337,0,0,1ac7c50918581434060258b6237ca41183133897d488a97678a496cbf023aa66,2025-02-25T12:15:31 @@ -277407,7 +277407,7 @@ CVE-2024-5610,0,0,c876fccd541dbbe5edac90b3257f7d2b3efde4d5bff83326921f06d03b7a38 CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000 CVE-2024-56112,0,0,9c37554a9e3e8121be632deb2b2e9ed13eeb0233b63a1c1f431c838fba55a392,2024-12-16T16:15:10.313000 CVE-2024-56113,0,0,c2004a54de70b831a98d60d2c2fb6bca131b530775b8918ef6395e30cd829051,2025-01-23T18:15:32.603000 -CVE-2024-56114,0,0,80b97861862ba12f51aa4e46485551b632a0c2a52df86bcb564294ea58a1f8c7,2025-01-16T19:15:28.787000 +CVE-2024-56114,0,1,edcf852199e0cd801e3ae938f8e870bfbcdb97c2eab2d9e5d6d32c5828fdd5a3,2025-01-16T19:15:28.787000 CVE-2024-56115,0,0,17cd74ad25051a45f91521081be96f78ec43985fc62b9893fc5da74912ce6906,2025-04-23T21:33:33.170000 CVE-2024-56116,0,0,e8aea0c63708e7b9ae4ad86601eeb2e56348e008753c0c18fd2bb0a490431bf6,2025-04-23T21:34:38.623000 CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 @@ -284124,7 +284124,7 @@ CVE-2025-1712,0,0,b94d0190ebdb3831769a5867dbc038d4d7585fa2490152c1e878c7d5a70443 CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000 CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000 CVE-2025-1717,0,0,3d4f0d449e7852a9bab717d0d55b537c9dc57d522d200e81bab92be20a7c833d,2025-03-11T16:12:42.783000 -CVE-2025-1718,1,1,254cd868400522121cc41a81158cb75e8ca4970550a9cd680981ee7f4e122c33,2025-06-24T13:15:21.547000 +CVE-2025-1718,0,1,6d0a145d557996297ca811dce1e9777bace02acfc8140401301ce1a24f26950e,2025-06-24T14:15:27.847000 CVE-2025-1723,0,0,c7576768b3fcdf2c172cabd995356c9a4e187202d556f18e62eeaf91cbbf52b2,2025-03-03T08:15:15.717000 CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847ed,2025-03-17T07:15:33.467000 CVE-2025-1725,0,0,c49b8d1c27e2c6728ab571d7d9ee0274a46175f957660be0c5aa759fde493bd7,2025-06-04T14:54:33.783000 @@ -287550,7 +287550,7 @@ CVE-2025-24026,0,0,851a3bf68c954484658a3468537933c8ee28750382a531089af82c153a4aa CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000 CVE-2025-24028,0,0,545c071838c816be977c3520d8d21408e612d6f5f92969ce1c4368203cb04b22,2025-04-18T01:57:17.133000 CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000 -CVE-2025-2403,1,1,f5056a4da79b936d803f5f9b3c662f9cb45c3707feab2a244ec3003b84f14580,2025-06-24T12:15:20.863000 +CVE-2025-2403,0,1,922dc374a649eb9a1795e8b830be58e7133f61414894da64a4c520128e51690d,2025-06-24T14:15:28.330000 CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000 CVE-2025-24031,0,0,f001af7155fa77b1de37ced441ee4e39c1454b911ef9ca1ee83e5bda55f8dc14,2025-02-10T16:15:38.990000 CVE-2025-24032,0,0,1178a4dc66e28f37c78bc3ebc36c9a48c540f3ad31de8ebddc9029a3c39156bd,2025-05-21T16:15:30.827000 @@ -290203,6 +290203,8 @@ CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25f CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000 CVE-2025-27825,0,0,204298b7de8459d92cd5ca573fe552fd0eb50c7361c94c6261df8c437005a654,2025-03-07T22:15:38.380000 CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce43480244837e,2025-03-07T22:15:38.527000 +CVE-2025-27827,1,1,5b3ba326fa4303e1f16d5e10eab4ee203d2f4b406490542503a551359ca434e6,2025-06-24T15:15:23 +CVE-2025-27828,1,1,dba5fd6802450b24a8c6dc40028328c85e74ec93354031d5ad5d4eefc139c69a,2025-06-24T15:15:23.267000 CVE-2025-27829,0,0,9ae86cabd1b5a8793e47645f5ed6e4bec7bf508d33296df63c4497b12aa63bd8,2025-04-14T18:15:28.697000 CVE-2025-2783,0,0,cac125e06bdfcf5101179da397d83671a8e22970d5207dd362f2ac73d6465a33,2025-03-28T01:00:02.260000 CVE-2025-27830,0,0,da10ce085c8af9893377a339d8c2cf0db7181ab295e76a10e0b8a5e6254179ce,2025-04-01T16:44:47.883000 @@ -290364,7 +290366,7 @@ CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18 CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000 CVE-2025-2826,0,0,73d45c19b2e4c3bc4d80772bd5509ff4acb0a98a2510975df320963b1c203a94,2025-05-28T15:01:30.720000 -CVE-2025-2828,0,0,4dc8c084884ef5b69b766a3edf30d3b934591e561b9cb7ae7c931516c27ac379,2025-06-23T21:15:25.210000 +CVE-2025-2828,0,1,5dcd8fb6602d0a5a28886880344c032e2bbe46511d3d7578cfc919bbf94a1b7a,2025-06-24T14:15:28.490000 CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000 CVE-2025-2830,0,0,44fbd6035d3d2cc03539fdc4859074e0483d9335c2d68a4a16795d3b39b2fa35,2025-06-18T13:37:00.120000 CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000 @@ -293420,10 +293422,10 @@ CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b8 CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000 CVE-2025-32873,0,0,f7d763f6cf9dd2dd2fc4fd446f09dcd8aecf88b16e7b9cbc3c04e6b52caefba3,2025-06-17T19:44:20.957000 CVE-2025-32875,0,0,ef16cc45f9d463b891fcccd40892c4fbe4ce3dc0b696a29a1045a30b036ebb7c,2025-06-23T20:16:40.143000 -CVE-2025-32876,0,0,d0c5dacb199f8bb490576d803a2540d8d367a87fa8e046871ecfa2850d2ecade,2025-06-23T20:16:40.143000 +CVE-2025-32876,0,1,b359294b619c26c8351a299d7818957dd391eeaf6565d3672638043e8443c0e5,2025-06-20T14:15:27.877000 CVE-2025-32877,0,0,74607664ebbbbcceb329bf3374e41935fdbdb1b26282ce7b04b4015abab39cd7,2025-06-23T20:16:40.143000 CVE-2025-32878,0,0,b43ea98c820eba767a823504fa14736ae60799328c6d58085470cd470347b3e1,2025-06-23T20:16:40.143000 -CVE-2025-32879,0,0,6b56549ac1cf6dfd0b2a41dc233d9b457d1d16d3a502b5db7f1cfdf2c8d42266,2025-06-23T20:16:40.143000 +CVE-2025-32879,0,1,d6389a00aca6f8d6250c1180546d76508f1e89722e323785ad1a9d5739f227fb,2025-06-20T14:15:28.783000 CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000 CVE-2025-32880,0,0,908f205c48f4ce6ec052266214a72cc2adc228fe98b67d23faadb405e9192759,2025-06-23T20:16:40.143000 CVE-2025-32881,0,0,2e6693087c6469e2e3ed7d14a7bafcb787b21e7f52bc589483e80625632ed3de,2025-06-20T16:53:44.603000 @@ -293505,6 +293507,10 @@ CVE-2025-32971,0,0,5487e79975fb0abb9378187756241a4603127b98b0de118af3bf155fc0457 CVE-2025-32972,0,0,f920511713bca3379924622d60cbe669c2136f54d45d25f9a06a402b14d9c31a,2025-05-13T15:05:07.237000 CVE-2025-32973,0,0,f240c0c82a1f9443b1a09de6c7f01c454aa45175be7a1efc3f550e2af9ed0e46,2025-05-13T14:58:48.890000 CVE-2025-32974,0,0,212ebce768fe1e6e3809501bd5b1c16e6076b1bd5655a4578512b867f7767f49,2025-05-13T14:55:03.707000 +CVE-2025-32975,1,1,d407c389f501a62ed1abc8ff0569ea2244d7e6c665fd13048e07cb0b7ab5ca77,2025-06-24T15:15:23.710000 +CVE-2025-32976,1,1,50002b2a08f283c271ee34483a954e057fa085bc870be4cb5abede59cb3e6deb,2025-06-24T15:15:23.930000 +CVE-2025-32977,1,1,636e65234014fe9ce99deefc49b4066edbec4880a58263af1e963d32340e786f,2025-06-24T15:15:24.063000 +CVE-2025-32978,1,1,77a786818286aff3233be916932d06ae584781a8e48fdca955b071b9bf67c519,2025-06-24T15:15:24.260000 CVE-2025-32979,0,0,64a29053417365e3bc807f310a7262b7a642ecb58a326e442c57ce048a184d74,2025-05-27T16:58:18.660000 CVE-2025-3298,0,0,42b3c11a03b3e330acf149137409814de4838d8396b46617a725d88596b9ad1f,2025-04-08T16:49:00.290000 CVE-2025-32980,0,0,ecd87f951455efbd2f051fc9c63fa88d716a4beefc941d871df4d77e37aa2f94,2025-05-09T17:15:51.220000 @@ -293676,8 +293682,8 @@ CVE-2025-34031,0,0,a83a89ead5008a99e70e59878287331f19ed475018e97ea254d5a6edcad82 CVE-2025-34032,0,0,1662c51249658a2df2b7fe7125b51d9c24492c5099a19327f9c89f372b8d7c6f,2025-06-24T03:15:32.987000 CVE-2025-34033,0,0,efbb2094e27eadf32cf2e2b87f771d72dc8ffd0952a128e2c253c810271eb5fe,2025-06-24T03:15:33.090000 CVE-2025-34034,0,0,9349522151798c41468e27385e7fbe77af654ab0fc85de66c1e4f22953696889,2025-06-24T03:15:33.193000 -CVE-2025-34035,0,0,ce2721f03a0b278f0cc26f99ff904d9fab13fc67019d936b442cf9447da7781d,2025-06-24T03:15:33.293000 -CVE-2025-34036,0,0,6b7350c61be49a76f76dc5d944c8fd7a529dcca7640facf7eca714339387463d,2025-06-24T01:15:24.903000 +CVE-2025-34035,0,1,875b7d990fc0620b461d78bcd5eb0a7cc37310985a6cc30d439b019a31ebffaa,2025-06-24T14:15:28.820000 +CVE-2025-34036,0,1,bf1ed7abf4ceff89d0043a51f6a47cfdcefc55033dd2180ec67b70376832b568,2025-06-24T14:15:28.953000 CVE-2025-34037,0,0,57a7e6a6846827b91b7736feffed008814a2f3414dc595a6f1c81aa1a94cc3f7,2025-06-24T03:15:33.400000 CVE-2025-34038,0,0,d6d8009e58294a673d7d0c556296273a5a5d83087c8fbf680e06184934d5f96d,2025-06-24T03:15:33.507000 CVE-2025-34039,0,0,33065581e59fb510332e7c56f1b2c71b818ba8cafc063bc369ac3087f87d0806,2025-06-24T02:15:22.540000 @@ -293846,7 +293852,7 @@ CVE-2025-3572,0,0,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fd CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000 CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000 CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000 -CVE-2025-3576,0,1,957bbbebfac26fb5d2c366a1581678e2e0c111337065d1b5061024ff1fcc5960,2025-06-24T13:15:22.657000 +CVE-2025-3576,0,0,957bbbebfac26fb5d2c366a1581678e2e0c111337065d1b5061024ff1fcc5960,2025-06-24T13:15:22.657000 CVE-2025-3577,0,0,56629bd7e990c7a0d492f7fcbfe38c7580cf294d9e5db776d3fa189b9e593731,2025-06-23T19:29:59.393000 CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 @@ -293930,6 +293936,7 @@ CVE-2025-36525,0,0,304058dc6057ec0d8f22d43f92f7c943e71e5e18bc158b199ea34013a3ed4 CVE-2025-36527,0,0,760bc907999d36f8a046dc03eb19c07cc3891fbdfc35cb8c53858aa720a6ac60,2025-06-16T15:15:28.320000 CVE-2025-36528,0,0,8cc5e94db4f898b6df57b60f4eabfb85cbf2d0b38d981f1163ef01852ec4f727,2025-06-16T15:14:39.797000 CVE-2025-36535,0,0,c9bb02422d586f784be4fd92873208eebb00e7be6f50c78d2e7b7d5656e18b71,2025-05-21T20:24:58.133000 +CVE-2025-36537,1,1,537d9428fe6d511877f1732e2599f4649461561b08464759f0ce4098dd36210b,2025-06-24T15:15:24.453000 CVE-2025-36539,0,0,c0894e36c5a4bf5ae06107887e6e7bc4869da6fc581815f366cc900be9ce130c,2025-06-16T12:32:18.840000 CVE-2025-36546,0,0,a3d190116ff33d28a9568351832ce70c70aecf8ab001cfb216ed0ea5695cb9ef,2025-05-08T14:39:09.683000 CVE-2025-36557,0,0,10d4b26bd4092d9203a2e113b056bea851721ed63eca24b2006dce264ace1ecf,2025-05-08T14:39:09.683000 @@ -294530,11 +294537,11 @@ CVE-2025-3916,0,0,045ece3601bd5ccbedc31ea0240de6aa0afd0b9d1478dcdfa2e80b8a58fde7 CVE-2025-3917,0,0,c5171151eebd44803f90dc57bca3ca581e3f3a3b4495aa64f3e44a3933917ede,2025-05-16T14:43:26.160000 CVE-2025-3918,0,0,63b01e62f8046021d2f78807719fa3fd3623a650f7755e4a8a67c57ed80094c1,2025-05-05T20:54:19.760000 CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee91,2025-06-04T14:54:33.783000 -CVE-2025-39201,1,1,02cfed698ec42683688284364461ec516c3f201fff787dca36f4bfac3388505d,2025-06-24T12:15:21.050000 -CVE-2025-39202,1,1,1ceb79e8683ca8b86085aee73b52d64a9420063a94a3ec0231aac3d6010adcd4,2025-06-24T12:15:21.200000 -CVE-2025-39203,1,1,105effc7d2cc0a50f2f8a11eccb1fa8d014885672d5e0acca9751a293116274a,2025-06-24T12:15:21.380000 -CVE-2025-39204,1,1,f9db2ea96e48656857748f0dcd014508d330f37fae87d14bc9db98d65bd1cdfe,2025-06-24T12:15:21.523000 -CVE-2025-39205,1,1,c2e8c085466724619991e0074af53a5491b0f8345d0c2e7edce628b578d4c3f8,2025-06-24T13:15:22.470000 +CVE-2025-39201,0,1,2a2b705d59d2db641dc13896dc38ae8450e764fe971fa82649b4efcaee535293,2025-06-24T14:15:29.090000 +CVE-2025-39202,0,1,378620856d3c2a1e2dda8cb9c122f4cdb4c98bfce82101c988da7af28b6db22c,2025-06-24T14:15:29.253000 +CVE-2025-39203,0,1,8a03c141ca6cca748bcd6d5053974606d53be79d7d4fff4e1c4a8a5351c52e71,2025-06-24T14:15:29.410000 +CVE-2025-39204,0,1,9a86a2eece1fba5610daf326fe4a9156f29d653dff3ac1a91dcf7b585fae1fb8,2025-06-24T14:15:29.553000 +CVE-2025-39205,0,1,bc324f59e73cfbf570b8d138ca8e0069cd4c714e1af6749bc77c49f6ec85acc0,2025-06-24T14:15:29.707000 CVE-2025-3921,0,0,9797fba579692252283cd90745f54a1a6a5a7131fc66f684fa524a93339f9b2c,2025-05-07T14:13:20.483000 CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000 CVE-2025-3924,0,0,7b87f51ca3c311667e1b7a4df04e30967e599dbb013055d4845862729654e283,2025-05-07T14:13:20.483000 @@ -297407,7 +297414,7 @@ CVE-2025-4863,0,0,43249181bdffc79d79f7051e6bf0b2e14593429b9b9273955a6682bdc98d5c CVE-2025-4864,0,0,6c043d94b451b0fea234b80943adf86f4d0d57aafd4c1ec310404002722a628f,2025-05-21T19:40:43.810000 CVE-2025-4865,0,0,1b90218d6ac12941641af735315ee2bba9918452b68b7460362d9a85bb72a4f9,2025-05-21T19:40:37.067000 CVE-2025-4866,0,0,0a7ac96ca7c9857605322d3dcc0b2d69bad50fd7149a1213ff9c9a3542da1a9d,2025-06-12T16:28:04.683000 -CVE-2025-4867,0,0,6969638a2809a255e3ca8192501edf4f067c74e1c1ac33da4faf9cfcf64ecf64,2025-05-19T13:35:20.460000 +CVE-2025-4867,0,1,3bb4ea7e467155b2b91320f132f4897443555070e946e86974e870aea250cfac,2025-05-19T13:35:20.460000 CVE-2025-4868,0,0,4b7e47c9fd74fa1deae3b46f591f039a3d43fcc446d7c3e49e093358b630ff92,2025-05-19T13:35:20.460000 CVE-2025-4869,0,0,870b6fb7f96763d1ac0b1ff6f50594749d4dd6426d23a4566486d6e216908d08,2025-05-28T11:48:37.013000 CVE-2025-48695,0,0,39b88432a15a3b8e91feb94d32e426fa969d9198b6e75ff2ba9bd798bc547242,2025-05-23T15:54:42.643000 @@ -297462,8 +297469,8 @@ CVE-2025-48792,0,0,2c0b02c33ee81c6b1c7f3bc9767aecae1b833af65e4351c0dd81998c4a119 CVE-2025-48793,0,0,c894ec9ed8b3b5d1fda9891ce2808a0fb7689dd63eec3c7bb7e9e649736a365c,2025-05-27T04:15:41.090000 CVE-2025-48794,0,0,0f60a10fd5bbac90e9e184a916afa3ee1c6a6178325620c93725d026aac184ad,2025-05-27T04:15:41.160000 CVE-2025-48796,0,0,5c467d1a2669d77ceb69e55cea05d09cde2aaa034119240321683e5490565638,2025-05-28T15:01:30.720000 -CVE-2025-48797,0,1,48040f572339677d8b62940bd3d85033c4e66b3c622b11f3747758e577f53a7d,2025-06-24T13:15:22.917000 -CVE-2025-48798,0,1,b9e6523b4026bcad2c811e2a8cc3b8fcc3580c3172ff91ee8792d194ce1f26a1,2025-06-24T13:15:23.123000 +CVE-2025-48797,0,0,48040f572339677d8b62940bd3d85033c4e66b3c622b11f3747758e577f53a7d,2025-06-24T13:15:22.917000 +CVE-2025-48798,0,0,b9e6523b4026bcad2c811e2a8cc3b8fcc3580c3172ff91ee8792d194ce1f26a1,2025-06-24T13:15:23.123000 CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000 CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000 CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000 @@ -298337,7 +298344,7 @@ CVE-2025-52875,0,0,70ff6c04abc6cfce849406946b406a459cb9d17561e94e81ec5aa5fb6103e CVE-2025-52876,0,0,04a8f13c1a5d28a7ba2f4420d94289fb86c66499f08f149bf03ece2dbbc8cea7,2025-06-23T20:16:21.633000 CVE-2025-52877,0,0,c1d6e2b07ce02bba590986d3df9c7581e2aa81b981d3f15dad43eb041681dd92,2025-06-23T20:16:21.633000 CVE-2025-52878,0,0,e55775b8d24e3fed0ad2e0acdd563793038173ab54bc92391fdb84ab91ed384a,2025-06-23T20:16:21.633000 -CVE-2025-52879,0,0,1c63908c7662c118128e37655472b7011228940fa4e77bb1378e7765ad171bc5,2025-06-23T20:16:21.633000 +CVE-2025-52879,0,1,36a19ea63eabffb0ae9b5df676b3f85180b31571a550ff8a02ef30a65c0880dd,2025-06-24T15:15:25.180000 CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000 CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000 CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000 @@ -298377,6 +298384,7 @@ CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a15 CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000 CVE-2025-5307,0,0,7244ff154b85c92ca09019f8de869bb0541c220b74776be3851e4cfba38a0ca8,2025-05-30T16:31:03.107000 CVE-2025-5309,0,0,4f40b16e57161a0b02ce9c3f4d7e0ba4cf08b0282b7954a09175078f67da41cb,2025-06-17T20:50:23.507000 +CVE-2025-5318,1,1,43978098e56851e5b415c4c8f175357a6aaaecebbdcfcfe803fcf95f094aa057,2025-06-24T14:15:30.523000 CVE-2025-5320,0,0,772070621ad15a70df6397a0142dc45fe5fca6b991b5410b5c6912332a34a15a,2025-06-01T05:15:19.883000 CVE-2025-5321,0,0,31d96e00ea1024b8084a7837ef9bf0b4fd55d789d529b1f4fae375684c451003,2025-06-01T05:15:20.947000 CVE-2025-5323,0,0,b0785ba87cd1215b18904af4ecc0dec4461f38599fcb91263ef5f63563e48a70,2025-05-30T16:31:03.107000 @@ -298878,6 +298886,7 @@ CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439 CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000 CVE-2025-6030,0,0,e2d083f85b4980fab673be25fe64ff6c58fe5f2e84e15893b8c80d92f1561a4f,2025-06-16T12:32:18.840000 CVE-2025-6031,0,0,8862006220262f75545734fb5f034c6db29d3c4cbd11030b12e4d70636f9f9cc,2025-06-16T12:32:18.840000 +CVE-2025-6032,1,1,d34db860f10fbaf4dc7b8227df55ccd2b29ad245beaf16847e29b7a4d47834c3,2025-06-24T14:15:30.703000 CVE-2025-6035,0,0,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f125,2025-06-16T12:32:18.840000 CVE-2025-6040,0,0,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000 CVE-2025-6050,0,0,67e03dde344620698f5a7773057ca524136abcdd721ce9bc82366b3da1039da8,2025-06-17T20:50:23.507000 @@ -298930,9 +298939,9 @@ CVE-2025-6121,0,0,ac34c215559700b52c27e4eb85187c0f90e04bada26cf85e1da5d5a006994f CVE-2025-6122,0,0,79bab9242c697b56597a153f6c6518ac5d670e665734da46c0282253ae61aec7,2025-06-17T20:50:33.517000 CVE-2025-6123,0,0,d43d6d94100d023989c481dec6c898d450ddbc20841ed4ddfcc99856183ef27f,2025-06-17T20:50:33.517000 CVE-2025-6124,0,0,5b60d811bf3cb9ef911f8612e6315e9b0b0997b30f24c3bf22952f378649f104,2025-06-17T20:50:23.507000 -CVE-2025-6125,0,0,845baaf06b498d67300e9383b189c90f15251cb9aa8584c2ad9756215c94ada1,2025-06-17T20:50:23.507000 -CVE-2025-6126,0,0,147bb2fcef9c6bc3415f0511de5c582b372e8ec5bd3f4621eaa46780ead3cda9,2025-06-17T20:50:23.507000 -CVE-2025-6127,0,0,23a983073a9d57505230a3940ec829bac38bd4d9f1a280ab883796d1888ab61c,2025-06-17T20:50:23.507000 +CVE-2025-6125,0,1,18afb62db98610dc3337e002140e0da5a295f857214abce94df772a0d52e12dd,2025-06-17T20:50:23.507000 +CVE-2025-6126,0,1,88235c21160075c480952838de6debb5ad37cb995ebb7db692c96370f9a531d2,2025-06-17T20:50:23.507000 +CVE-2025-6127,0,1,20c9da6df7a99689522c7c15589e8525b4579befe4a6c774e5ce491386916b7a,2025-06-17T20:50:23.507000 CVE-2025-6128,0,0,1e377ac73a59a167c73fcf96e4c6971eb9041bf3cc73e824932eb4a056ae1f9f,2025-06-17T20:50:23.507000 CVE-2025-6129,0,0,c11fcf3a911a2d8d8c4b37d8252afa26669376fbb7214d4fcbed546932aa455b,2025-06-17T20:50:23.507000 CVE-2025-6130,0,0,cb569be39f5f1da076d06669e0896e22c8cd60dff8ebc57d155295bc5acb6c81,2025-06-20T14:39:23.200000 @@ -298958,11 +298967,11 @@ CVE-2025-6149,0,0,bfa9b70c74b833d4b13edc2b8c0deb75557d095959799446cbc897b529f453 CVE-2025-6150,0,0,1c1c8c9840248db413992659480d6a0621f81bf1fb34376aa4877ba8e62a64a5,2025-06-23T19:28:18.330000 CVE-2025-6151,0,0,66f985d955d28732cb3e20742ce5c2b75d056fdf6e0c0fd5329b3e2551fd465e,2025-06-19T01:20:04.247000 CVE-2025-6152,0,0,ff4ccaf39bf818abdc375e234ccbed4be33d2e886689e2e8335c122e3871c2eb,2025-06-17T20:50:23.507000 -CVE-2025-6153,0,0,2fc60dca756ddc4e172d6897384ac8518a5ff1f5174120a3dcec13ba5207b272,2025-06-17T20:50:23.507000 -CVE-2025-6154,0,0,f1415c5a2eb0eacb2f774f7a7fb86d492db28bb7f75636c28658e54eafbc0f4f,2025-06-17T20:50:23.507000 -CVE-2025-6155,0,0,be11d001072469fc87458e52f5d19346f46beeb8af1d40a7e97c5ddedad3b12d,2025-06-17T20:50:23.507000 -CVE-2025-6156,0,0,85583d7bd2902eb7639c6c1aa8ad39c82190eb0e792586e6c3dcbe77c821d0e1,2025-06-17T20:50:23.507000 -CVE-2025-6157,0,0,18b8bacb7e7608c9c770eca0a6aa66a6d43337b92593fd019530530522499345,2025-06-17T20:50:23.507000 +CVE-2025-6153,0,1,84c54f12ce3c4b2788acc50498f1e5b6b54cd80844bea96e08e9041eee82570d,2025-06-17T20:50:23.507000 +CVE-2025-6154,0,1,784a399212f7e19dcdd4a48307096b2f0ab3d4e2d63511008fff789baf0e4bf8,2025-06-17T20:50:23.507000 +CVE-2025-6155,0,1,2c57494ff5fbd6c3d33e6762ebd24c63b2d0e3f1ab5a220ef66bbd7671547bbd,2025-06-17T20:50:23.507000 +CVE-2025-6156,0,1,0d32496606d006c3ba82b347d139253ef04f11ffe625ca034e0ac245714b6a7b,2025-06-17T20:50:23.507000 +CVE-2025-6157,0,1,90f59e8d7123b39365e840973bb9606b8a67273ee78e33fa045e1a4c6f50da0b,2025-06-17T20:50:23.507000 CVE-2025-6158,0,0,2f36d74bb802a051d651546127c3dc725b5baddaf659643b5bacdd29188892d6,2025-06-17T20:50:23.507000 CVE-2025-6159,0,0,38e8ac5e5294c42b259b82c8daef65af0d7b30e502051f62b250d30a5a031545,2025-06-17T20:50:23.507000 CVE-2025-6160,0,0,ade16d050fe213428b173ad29429dde198ba45d3ed2aa7e95b41154f41eeda9d,2025-06-17T20:50:23.507000 @@ -299104,32 +299113,32 @@ CVE-2025-6406,0,0,8e98eb43ab331ce625be77bc96e3beed8b2dc8cdddf070452c440c196f0871 CVE-2025-6407,0,0,2c5b5c8dcc8d6c7c975193c22c2fce6d047e7cb94f11bcfcbec6cb37cf8e66ce,2025-06-23T20:16:21.633000 CVE-2025-6408,0,0,223016691e0988d905245099e386f66215b44ae2ab1d500d2394d1534fb283c6,2025-06-23T20:16:21.633000 CVE-2025-6409,0,0,5b6c3f8f913fad4b69daaad6404be658fe7e6646a82367b1f57133278330f71c,2025-06-23T20:16:21.633000 -CVE-2025-6410,0,0,10c0e995048a5fe80535330f88c3842563bb9d2a6fa7aa77d6801c8e012f2342,2025-06-23T20:16:21.633000 -CVE-2025-6411,0,0,758f124c49d1a0adb23c5330253f0da8fc25bf7c6c10c0f8e0fa9f91867044a1,2025-06-23T20:16:21.633000 -CVE-2025-6412,0,0,4bc4619b32fff5416958d58ac751ed0e1ff6677e6229bb2b763e46f7c48d1da7,2025-06-23T20:16:21.633000 -CVE-2025-6413,0,0,688af4e324d3a4604fc65318f683d9cba7c79a0f0c75e629bbd28153a77ca83d,2025-06-23T20:16:21.633000 -CVE-2025-6414,0,0,2514edd847894d548106771ca05d4d2a028bc6ad228392af03505a56c1f5f91e,2025-06-23T20:16:21.633000 -CVE-2025-6415,0,0,dc41afbd76d60357eafe65d092bf38ddea2a9fe59d3ca007ba198ca39fc40749,2025-06-23T20:16:21.633000 -CVE-2025-6416,0,0,8d43992b59606b70f54ebd60d55d3ffe362388b5bae77904f49a2df9d302c111,2025-06-23T20:16:21.633000 -CVE-2025-6417,0,0,a903dee3489b79a97e9cf3b4cfb44f4d6b6dc6e55a15846d3b20ad4297e1e2be,2025-06-23T20:16:21.633000 +CVE-2025-6410,0,1,d5093121a62c3b03264c8b74cf8cee58e08566191457abd305673f3d7b08558c,2025-06-24T14:51:28.207000 +CVE-2025-6411,0,1,0e09e6bd75e65ae7b58d0e0820c1abe7bd7d437f8f8a3059af1dd0350f51a6eb,2025-06-24T14:51:00.910000 +CVE-2025-6412,0,1,079483de9c3bd0a5bc9a675e45d922c2a7f9e0ab5ec14494088543bc4cc27948,2025-06-24T14:45:30.210000 +CVE-2025-6413,0,1,def8ac7153cd4247d0c4cdbb262191ec85518ce8bb9fdb44e2051c1b4248ee65,2025-06-24T14:44:44.467000 +CVE-2025-6414,0,1,4eee093f61e0856e820fcce1dd983d848e970d6e3ba9a8157662d6a173a0c8a8,2025-06-24T14:43:54.553000 +CVE-2025-6415,0,1,d99b1b62da229a57bb10bf97c0f53cd32822887e7cf2412dbde9d23a1b40c301,2025-06-24T14:42:25.020000 +CVE-2025-6416,0,1,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000 +CVE-2025-6417,0,1,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000 CVE-2025-6418,0,0,f7f733adc12154a9b9fe75cebdc155063670b53939728e76deeaf5149ae11e9b,2025-06-23T20:16:21.633000 CVE-2025-6419,0,0,3617b941b01f49b9887977e8c6068fd5eeb7fe8de612aa23856dff79b97287cf,2025-06-23T20:16:21.633000 CVE-2025-6420,0,0,6cdd074ad9636d47cb353088e65c5fe1d77bedf88b71bf3c2519aff243ef5171,2025-06-23T20:16:21.633000 CVE-2025-6421,0,0,5609a4a5b8ba6038f8f981b034f22b275327d1d8839411237326052b483006a3,2025-06-23T20:16:21.633000 CVE-2025-6422,0,0,106ef9916b04166cc5945f1203191244e9fd131bda586696c6c5fbd69a1a1382,2025-06-23T20:16:21.633000 -CVE-2025-6424,1,1,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000 -CVE-2025-6425,1,1,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000 -CVE-2025-6426,1,1,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000 -CVE-2025-6427,1,1,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000 -CVE-2025-6428,1,1,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000 -CVE-2025-6429,1,1,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000 -CVE-2025-6430,1,1,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000 -CVE-2025-6431,1,1,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000 -CVE-2025-6432,1,1,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000 -CVE-2025-6433,1,1,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000 -CVE-2025-6434,1,1,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000 -CVE-2025-6435,1,1,a4f11279479a34cb7bd8fbada0da1482074cfe4aa0941feb03a5381d18eb3739,2025-06-24T13:15:24.560000 -CVE-2025-6436,1,1,a86bef510ff7551eac1bbe2f43ff96eabbbcfe6b21cca459abc01b1f7cc075cb,2025-06-24T13:15:24.677000 +CVE-2025-6424,0,0,9313426f660ccdc0028a285f0ebda07fd1723d8f2e14b0d7e53cc6ab2b265e80,2025-06-24T13:15:23.273000 +CVE-2025-6425,0,0,fe323b43bab8acd504006d763b5431357cc57c85d975615a28223b8ddbeb232c,2025-06-24T13:15:23.403000 +CVE-2025-6426,0,0,62ec6140619138de1ff0c6c2430da6a5944432b22fef80b8daec8bd1d41ac50c,2025-06-24T13:15:23.537000 +CVE-2025-6427,0,0,9b2a62aa828fd0783c24a61ccadc32208967da6bed3843b463a3b47b961b4a6c,2025-06-24T13:15:23.650000 +CVE-2025-6428,0,0,e2ee855e3a007fe69f1a84502b9280b01542f868cd0364afd8f0378d3e191171,2025-06-24T13:15:23.770000 +CVE-2025-6429,0,0,e4079d02afc4266101c6c99a54d823e31cc61c3e1ac8d26773a179f8d7ceff4e,2025-06-24T13:15:23.877000 +CVE-2025-6430,0,0,03899b32fe396c89196bbf57550983927bd75479d35e17ab4eefdf7973a1595b,2025-06-24T13:15:23.993000 +CVE-2025-6431,0,0,0d197b928405a0f7bd6fa1fb8bec500dd650a298f33ac8609c7a42ea3711ce62,2025-06-24T13:15:24.103000 +CVE-2025-6432,0,0,dc1b5c4e50cf6f515296b16df4fc1504a747cae8428b86a0ca25c0f18fd9fa30,2025-06-24T13:15:24.220000 +CVE-2025-6433,0,0,e9e6886748c1945d8162fd820ccc8b3502d8220fe8515a455d8264322c547839,2025-06-24T13:15:24.327000 +CVE-2025-6434,0,0,599cc13e47b64b667eda8d1a374814f3f336fa1a7f1de206c253b383dca38651,2025-06-24T13:15:24.447000 +CVE-2025-6435,0,1,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000 +CVE-2025-6436,0,0,a86bef510ff7551eac1bbe2f43ff96eabbbcfe6b21cca459abc01b1f7cc075cb,2025-06-24T13:15:24.677000 CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000 CVE-2025-6447,0,0,ccb7491a53a65edb2a46fa34f91bfc98d3e4b5a673ea57cbc2e7809ed2b6f681,2025-06-23T20:16:21.633000 CVE-2025-6448,0,0,8222bc4acb92d0f776e1d0bca83e07196c49a6462816bce44b6bf839e1dbed85,2025-06-23T20:16:21.633000 @@ -299183,7 +299192,7 @@ CVE-2025-6511,0,0,cc8ab409e471e104e8e1fc80b5595697eff632bcca500a8d8c88c3888c6686 CVE-2025-6512,0,0,9438eabdabda483dd3b2ea151d5688e848c8b3bd4d972d71e143c1071f589b10,2025-06-23T20:16:21.633000 CVE-2025-6513,0,0,6fcda6ec8fe8d4d7a71ff944570d0aef3cd920458f304839d1b1f59be7ed3d56,2025-06-23T20:16:21.633000 CVE-2025-6516,0,0,e83db0c9c5092f4cce7b7b0f8d09e2747b540199cda06219d8f0e056f084fbf0,2025-06-23T20:16:21.633000 -CVE-2025-6517,0,0,866bf0b3827ed5b1b4db7d2e627753bd746fb1a76e73c54ae14f2575f0c61270,2025-06-23T20:16:21.633000 +CVE-2025-6517,0,1,ccb7b7977bc47f9b2f5f57f3b073cd6f70cdee9c4ad69519d93767dd6116a3b9,2025-06-24T14:15:31.093000 CVE-2025-6518,0,0,79913a6994b5a0cfc1a00cf4e1af2784faaece099aa53440c6a31b8bb0c63ace,2025-06-23T20:16:21.633000 CVE-2025-6524,0,0,e49785f0fd827aecc01b85ae4e043e18698692ec26bc7ec337665a5554061752,2025-06-23T21:15:27.970000 CVE-2025-6525,0,0,35605120f939d0314ffb4372828fc2819d48e220e02caf00b1c5333f290dc2d4,2025-06-23T22:15:22.697000 @@ -299196,13 +299205,16 @@ CVE-2025-6531,0,0,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a99 CVE-2025-6532,0,0,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000 CVE-2025-6533,0,0,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000 CVE-2025-6534,0,0,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000 -CVE-2025-6535,0,0,8a2e2c08150c23298f895d6a8de96df4340489455f5e26a4dde31f70afc5bfd3,2025-06-24T01:15:25.513000 +CVE-2025-6535,0,1,e42f1a6543dbf0ee5c229c993281b53636fa2406c8182d5b8ffaa7f8f3686b13,2025-06-24T14:15:31.237000 CVE-2025-6536,0,0,d013adec60ee7bce984765f553f00621206bf7b36426e84a34c5c79dd02e790d,2025-06-24T02:15:22.967000 CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000 CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000 -CVE-2025-6551,0,0,a52fe52125cb153ac1dee3a35a2dc92fb922b4d13172e77504580f4841a730e4,2025-06-24T02:15:23.170000 +CVE-2025-6551,0,1,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000 CVE-2025-6552,0,0,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000 CVE-2025-6559,0,0,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000 CVE-2025-6560,0,0,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000 -CVE-2025-6565,1,1,7c02fe0d71d3ef34b32cfe8d9c10c27142ce892b4368d3b905ba19c7208bc8cf,2025-06-24T13:15:24.790000 -CVE-2025-6566,1,1,80c33a5e765c828c57a43e47bfe700e09d31372257b02be3aed80b3dd3347991,2025-06-24T13:15:25.057000 +CVE-2025-6565,0,0,7c02fe0d71d3ef34b32cfe8d9c10c27142ce892b4368d3b905ba19c7208bc8cf,2025-06-24T13:15:24.790000 +CVE-2025-6566,0,0,80c33a5e765c828c57a43e47bfe700e09d31372257b02be3aed80b3dd3347991,2025-06-24T13:15:25.057000 +CVE-2025-6567,1,1,5d754149f93ad7069f2d6b06b39e9a8d3070555d19c5f3fd33d0f2fd359ea32d,2025-06-24T15:15:25.623000 +CVE-2025-6568,1,1,78c40c1dd546517356b970cf01de10a143e7aca6dbd9dbb56f6a07312247f2e6,2025-06-24T15:15:25.823000 +CVE-2025-6569,1,1,a9a253cca959ecf71ee669abff58d1659a78fe1070e8dc321456c5ad3c982f46,2025-06-24T15:15:26.017000