diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6492.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6492.json new file mode 100644 index 00000000000..c37faf7d858 --- /dev/null +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6492.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6492", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-22T20:15:19.803", + "lastModified": "2025-06-22T20:15:19.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in MarkText up to 0.17.1 and classified as problematic. Affected by this vulnerability is the function getRecommendTitleFromMarkdownString of the file marktext/src/main/utils/index.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/marktext/marktext/pull/3952", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mmmsssttt404/marktext/blob/c59b3ad423dfa082869933baf9f5d5c69bdcc560/test/unit/specs/match-electron-accelerator.spec.js#L155-L164", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313609", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313609", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.598208", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 16cb12109f9..c9e0b16ba5f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-22T20:00:19.579804+00:00 +2025-06-22T22:00:18.745315+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-22T19:15:20.790000+00:00 +2025-06-22T20:15:19.803000+00:00 ``` ### Last Data Feed Release @@ -33,17 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299050 +299051 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `1` -- [CVE-2025-6486](CVE-2025/CVE-2025-64xx/CVE-2025-6486.json) (`2025-06-22T18:15:22.573`) -- [CVE-2025-6487](CVE-2025/CVE-2025-64xx/CVE-2025-6487.json) (`2025-06-22T18:15:22.783`) -- [CVE-2025-6489](CVE-2025/CVE-2025-64xx/CVE-2025-6489.json) (`2025-06-22T19:15:19.843`) -- [CVE-2025-6490](CVE-2025/CVE-2025-64xx/CVE-2025-6490.json) (`2025-06-22T19:15:20.790`) +- [CVE-2025-6492](CVE-2025/CVE-2025-64xx/CVE-2025-6492.json) (`2025-06-22T20:15:19.803`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 223d51ce5d6..957e93db7ad 100644 --- a/_state.csv +++ b/_state.csv @@ -299045,7 +299045,8 @@ CVE-2025-6482,0,0,78387bba44ac09fbee211415a49a79664a437b6e640985cdc3eb90313186dc CVE-2025-6483,0,0,67de2bed11f228cf0694070dd76b14c3600456ceb91ea3259486298d9f88fe29,2025-06-22T16:15:24.290000 CVE-2025-6484,0,0,33a4523a2eee6a3d0906d201bbbb401845815d10726c879dd2764368614481f6,2025-06-22T17:15:22.063000 CVE-2025-6485,0,0,ded60fbb52c43c1ae95dc7eb194f7ec4cc8e18930c21e2ec8a8edeeed026021c,2025-06-22T17:15:23.043000 -CVE-2025-6486,1,1,9e16bc0241dddb621b6c91e25d2bb2260b532feb11518a7d0833a6e6c99132d1,2025-06-22T18:15:22.573000 -CVE-2025-6487,1,1,24e784a232cd8f124d85013955e4e21551f714b100e952bb10e264db938b4b3c,2025-06-22T18:15:22.783000 -CVE-2025-6489,1,1,971a9bd0a1a72ae3f73fdaf4e3d9d8c0dc708f0cae7d8404552c50114055ec65,2025-06-22T19:15:19.843000 -CVE-2025-6490,1,1,b5785fba3d09e5e40c600b2d07cffbd3014815c7c72569b13ae7bca50f9eb9a0,2025-06-22T19:15:20.790000 +CVE-2025-6486,0,0,9e16bc0241dddb621b6c91e25d2bb2260b532feb11518a7d0833a6e6c99132d1,2025-06-22T18:15:22.573000 +CVE-2025-6487,0,0,24e784a232cd8f124d85013955e4e21551f714b100e952bb10e264db938b4b3c,2025-06-22T18:15:22.783000 +CVE-2025-6489,0,0,971a9bd0a1a72ae3f73fdaf4e3d9d8c0dc708f0cae7d8404552c50114055ec65,2025-06-22T19:15:19.843000 +CVE-2025-6490,0,0,b5785fba3d09e5e40c600b2d07cffbd3014815c7c72569b13ae7bca50f9eb9a0,2025-06-22T19:15:20.790000 +CVE-2025-6492,1,1,37c2ee6e912d11a549ad7370223cfbc8853f761832f2a62dffc4ba74e9ac72aa,2025-06-22T20:15:19.803000