Auto-Update: 2025-06-24T02:00:19.482773+00:00

This commit is contained in:
cad-safe-bot 2025-06-24 02:04:00 +00:00
parent 237353568a
commit f9e7766ff6
43 changed files with 2840 additions and 747 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-3432",
"sourceIdentifier": "psirt@cisco.com",
"published": "2025-02-12T00:15:07.670",
"lastModified": "2025-02-26T18:15:11.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:12:09.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -73,10 +73,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:macos:*:*",
"versionEndExcluding": "4.9.00086",
"matchCriteriaId": "D9A113B2-E3B3-4290-AA9F-183410CB115F"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-mac-dos-36s2y3Lv",
"source": "psirt@cisco.com"
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11184",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-02T06:15:06.697",
"lastModified": "2025-01-06T21:15:13.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-24T00:21:37.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp_enable_svg_project:wp_enable_svg:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.7",
"matchCriteriaId": "DDD2E20B-9C67-48EF-9B9C-A29EF29FCFFC"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/fc982bcb-9974-481f-aef4-580ae9edc3c8/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/fc982bcb-9974-481f-aef4-580ae9edc3c8/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28715",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T21:15:07.870",
"lastModified": "2024-11-21T09:06:48.480",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-24T01:35:34.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:html-js:doracms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.18",
"matchCriteriaId": "DEC0FCC3-300E-4B12-B802-54F4B391C35B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Lq0ne/CVE-2024-28715",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Lq0ne/CVE-2024-28715",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31029",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:04.313",
"lastModified": "2024-10-23T17:35:04.327",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T01:13:44.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keith-cullen:freecoap:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E92C8E66-1E72-409F-A020-416361E4FEFC"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/dqp10515/41ec400b7eecfcae7578d505598ab85f",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/keith-cullen/FreeCoAP/issues/36",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40113",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T16:15:27.010",
"lastModified": "2025-06-02T20:15:21.963",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-24T01:00:53.330",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sitecom:wlx-2006_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5",
"matchCriteriaId": "1041B225-883C-4ACB-A6B5-07A998BB7645"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sitecom:wlx-2006:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE8515F-223E-48F8-A875-C8B551D6623C"
}
]
}
]
}
],
"references": [
{
"url": "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40113",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40114",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-02T16:15:27.127",
"lastModified": "2025-06-02T20:15:22.130",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-24T00:59:48.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sitecom:wlx-2006_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5",
"matchCriteriaId": "1041B225-883C-4ACB-A6B5-07A998BB7645"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sitecom:wlx-2006:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE8515F-223E-48F8-A875-C8B551D6623C"
}
]
}
]
}
],
"references": [
{
"url": "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40114",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40494",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:04.493",
"lastModified": "2024-10-23T17:35:05.100",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T01:11:48.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keith-cullen:freecoap:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E92C8E66-1E72-409F-A020-416361E4FEFC"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/dqp10515/e9d7d663cb89187bfe7b39bb3aeb0113",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/dqp10515/security/tree/main/FreeCoAP_bug",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41712",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:06.387",
"lastModified": "2024-10-23T21:35:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T01:30:56.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.8.1.5",
"matchCriteriaId": "A86FB9E2-A0A9-45A4-86CD-073206E7E41C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0022",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41714",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:06.547",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T01:29:55.607",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.8.1.5",
"matchCriteriaId": "A86FB9E2-A0A9-45A4-86CD-073206E7E41C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:mivoice_business_solution_virtual_instance:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.0.27",
"matchCriteriaId": "E51D13DD-C01D-4544-AC66-0418D41916AC"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0021",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46478",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T18:15:08.863",
"lastModified": "2024-10-25T20:35:09.710",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T01:09:04.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.18:*:*:*:*:*:*:*",
"matchCriteriaId": "409A47B0-E7B3-49CE-BAEA-5638083F72DD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/michaelrsweet/htmldoc/commit/683bec548e642cf4a17e003fb34f6bbaf2d27b98",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/michaelrsweet/htmldoc/issues/529",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47224",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:06.650",
"lastModified": "2024-11-05T21:35:10.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T01:21:34.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.8.1.201",
"matchCriteriaId": "C63877D5-7A76-4953-A3E1-A72CD7FD7AD6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0025",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50658",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-07T18:15:18.990",
"lastModified": "2025-01-08T16:15:34.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:17:53.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipublishmedia:adportal:3.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "4D1DEA65-D968-4279-A9A1-5EF1FB9BEFCC"
}
]
}
]
}
],
"references": [
{
"url": "http://adportal.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://ipublish.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://petercipolone.info/wp-content/uploads/2025/01/iPublishMedia_AdPortal3.0.39_CVEs.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50931",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-10T19:15:30.813",
"lastModified": "2024-12-11T16:15:13.317",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-24T00:38:36.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:silabs:z-wave_500_firmware:6.84.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C08C5AA2-152B-4BB0-AD44-ACD9996C5274"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:silabs:z-wave_500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E57BC7A-D27E-4720-B865-5BA702791203"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CNK2100/2024-CVE/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51165",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-10T20:15:20.523",
"lastModified": "2024-12-11T15:15:15.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:37:18.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ketr:jepaas:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "586A6F83-5418-4E07-8F7B-26E3C6B7E4DA"
}
]
}
]
}
],
"references": [
{
"url": "https://abcc111.github.io/posts/CVE-2024-51165/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/abcc111/vulns/blob/main/JEPaaS/SQL%20injection%20vulnerability%20in%20JEPaaS.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55008",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-07T16:15:36.337",
"lastModified": "2025-01-08T20:15:28.467",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:19:17.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jatos:jatos:3.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE77CBB-B790-4CBD-B1C9-2EDBF5138607"
}
]
}
]
}
],
"references": [
{
"url": "http://jatos.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://hacking-notes.medium.com/cve-2024-51379-jatos-v3-9-4-account-lockout-denial-of-service-cc970f4ca58f",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hacking-notes.medium.com/cve-2024-51379-jatos-v3-9-4-account-lockout-denial-of-service-cc970f4ca58f",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55089",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-18T18:15:07.670",
"lastModified": "2025-03-17T22:15:13.927",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:32:09.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rhymix:rhymix:2.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E9759739-3726-4E6D-BF7E-CE1951F91504"
}
]
}
]
}
],
"references": [
{
"url": "https://tasteful-stamp-da4.notion.site/CVE-2024-55089-15b1e0f227cb8064a563c697709b7530?pvs=73",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56737",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-29T07:15:06.000",
"lastModified": "2024-12-31T19:15:48.200",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:30:45.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.12",
"matchCriteriaId": "6ECC2401-511C-4A2E-878F-C7053FA3ABB1"
}
]
}
]
}
],
"references": [
{
"url": "https://savannah.gnu.org/bugs/?66599",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56738",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-29T07:15:06.183",
"lastModified": "2024-12-31T19:15:48.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:29:03.183",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,44 @@
"value": "CWE-208"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.12",
"matchCriteriaId": "6ECC2401-511C-4A2E-878F-C7053FA3ABB1"
}
]
}
]
}
],
"references": [
{
"url": "https://savannah.gnu.org/bugs/?66603",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57427",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-06T17:15:20.357",
"lastModified": "2025-02-06T17:15:20.357",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:13:56.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpjabbers:cinema_booking_system:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2192B8FB-CC44-47A7-9CD4-3778B1874B25"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ahrixia/CVE-2024-57427",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.phpjabbers.com/cinema-booking-system/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ahrixia/CVE-2024-57427",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57428",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-06T17:15:20.527",
"lastModified": "2025-02-06T22:15:39.223",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:13:30.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpjabbers:cinema_booking_system:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2192B8FB-CC44-47A7-9CD4-3778B1874B25"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ahrixia/CVE-2024-57428",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.phpjabbers.com/cinema-booking-system/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57429",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-06T17:15:20.627",
"lastModified": "2025-02-06T22:15:39.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:13:05.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpjabbers:cinema_booking_system:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2192B8FB-CC44-47A7-9CD4-3778B1874B25"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ahrixia/CVE-2024-57429",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.phpjabbers.com/cinema-booking-system/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57430",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-06T17:15:20.717",
"lastModified": "2025-02-06T22:15:39.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:12:38.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpjabbers:cinema_booking_system:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2192B8FB-CC44-47A7-9CD4-3778B1874B25"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ahrixia/CVE-2024-57430",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.phpjabbers.com/cinema-booking-system/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26136",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T21:15:13.770",
"lastModified": "2025-03-05T17:15:16.017",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:54:20.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wangl1989:mysiteforme:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2025-01-01",
"matchCriteriaId": "5D2FB15E-AC56-4326-BB0A-86946C85210F"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/xiadmin6/6d664692d31a04eb59096a488b9f3712",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26319",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T22:15:40.993",
"lastModified": "2025-03-05T17:15:16.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:50:39.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flowiseai:flowise:2.2.6:-:*:*:*:*:*:*",
"matchCriteriaId": "D9820E91-2757-485F-8089-3B5D153A43F1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dorattias/CVE-2025-26319",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Patch",
"Exploit"
]
},
{
"url": "https://github.com/dorattias/CVE-2025-26319",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory",
"Patch",
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27622",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2025-03-05T23:15:13.990",
"lastModified": "2025-03-06T17:15:23.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:48:40.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "2.492.2",
"matchCriteriaId": "4059EF76-A4B8-47E4-A1CD-1F5FE9E21EC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"versionEndExcluding": "2.500",
"matchCriteriaId": "5208C20B-F05A-4D68-969F-38617E6ECE17"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3495",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27623",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2025-03-05T23:15:14.097",
"lastModified": "2025-03-06T17:15:23.647",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:46:38.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "2.492.2",
"matchCriteriaId": "4059EF76-A4B8-47E4-A1CD-1F5FE9E21EC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"versionEndExcluding": "2.500",
"matchCriteriaId": "5208C20B-F05A-4D68-969F-38617E6ECE17"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3496",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27624",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2025-03-05T23:15:14.197",
"lastModified": "2025-03-06T17:15:23.797",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:45:20.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "2.492.2",
"matchCriteriaId": "4059EF76-A4B8-47E4-A1CD-1F5FE9E21EC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"versionEndExcluding": "2.500",
"matchCriteriaId": "5208C20B-F05A-4D68-969F-38617E6ECE17"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3498",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27625",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2025-03-05T23:15:14.297",
"lastModified": "2025-03-06T17:15:23.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-24T00:42:16.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "2.492.2",
"matchCriteriaId": "4059EF76-A4B8-47E4-A1CD-1F5FE9E21EC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"versionEndExcluding": "2.500",
"matchCriteriaId": "5208C20B-F05A-4D68-969F-38617E6ECE17"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3501",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34031",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:23.340",
"lastModified": "2025-06-24T01:15:23.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/moodle-lms-jmol-jsmol-plugin-path-traversal",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/46881",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34032",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.350",
"lastModified": "2025-06-24T01:15:24.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/moodle-lms-jmol-jsmol-plugin-xss",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/46881",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-34033",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.493",
"lastModified": "2025-06-24T01:15:24.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the Blue Angel Software Suite running on embedded Linux devices via the ping_addr parameter in the webctrl.cgi script. The application fails to properly sanitize input before passing it to the system-level ping command. An authenticated attacker can inject arbitrary commands by appending shell metacharacters to the ping_addr parameter in a crafted GET request to /cgi-bin/webctrl.cgi?action=pingtest_update. The command's output is reflected in the application's web interface, enabling attackers to view results directly. Default and backdoor credentials can be used to access the interface and exploit the issue. Successful exploitation results in arbitrary command execution as the root user."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/blue-angel-software-suite-command-injection-default-credentials",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/46792",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-34034",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.630",
"lastModified": "2025-06-24T01:15:24.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A hardcoded credential vulnerability exists in the Blue Angel Software Suite deployed on embedded Linux systems. The application contains multiple known default and hardcoded user accounts that are not disclosed in public documentation. These accounts allow unauthenticated or low-privilege attackers to gain administrative access to the device\u2019s web interface."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/blue-angel-software-suite-command-injection-default-credentials",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/46792",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,98 @@
{
"id": "CVE-2025-34035",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.763",
"lastModified": "2025-06-24T01:15:24.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://cxsecurity.com/issue/WLB-2017060050",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://packetstormsecurity.com/files/142792",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service-command-injection",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/42114",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34036",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.903",
"lastModified": "2025-06-24T01:15:24.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in white-labeled DVRs manufactured by TVT, affecting a custom HTTP service called \"Cross Web Server\" that listens on TCP ports 81 and 82. The web interface fails to sanitize input in the URI path passed to the language extraction functionality. When the server processes a request to /language/[lang]/index.html, it uses the [lang] input unsafely in a tar extraction command without proper escaping. This allows an unauthenticated remote attacker to inject shell commands and achieve arbitrary command execution as root."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/shenzhen-tvt-cctv-dvr-command-injection",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://web.archive.org/web/20160322204109/http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/39596",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34037",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:25.037",
"lastModified": "2025-06-24T01:15:25.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in various models of E-Series Linksys\u00a0routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the \"TheMoon\" worm to deploy a MIPS ELF payload, enabling arbitrary code execution on the router. This vulnerability may affect other Linksys products to include, but not limited to, WAG/WAP/WES/WET/WRT-series router models and Wireless-N access points and routers."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://isc.sans.edu/diary/17633",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/linksys-multiple-routers-command-injection",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/31683",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-5777",
"sourceIdentifier": "secure@citrix.com",
"published": "2025-06-17T13:15:21.523",
"lastModified": "2025-06-17T20:50:23.507",
"lastModified": "2025-06-24T01:15:25.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient input validation leading to memory overread\u00a0on the NetScaler Management Interface\u00a0NetScaler ADC\u202fand NetScaler Gateway"
"value": "Insufficient input validation leading to memory overread when the\u00a0NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server"
},
{
"lang": "es",
"value": "Validaci\u00f3n de entrada insuficiente que provoca una sobrelectura de memoria en la interfaz de administraci\u00f3n de NetScaler, NetScaler ADC y NetScaler Gateway"
}
],
"metrics": {

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6531",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T00:15:25.917",
"lastModified": "2025-06-24T00:15:25.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SIFUSM/MZZYG BD S1 up to 20250611. It has been declared as problematic. This vulnerability affects unknown code of the component RTSP Live Video Stream Endpoint. The manipulation leads to improper access controls. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. This dashcam is distributed by multiple resellers and different names."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 3.3,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/geo-chen/BD",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/geo-chen/BD?tab=readme-ov-file#finding-1-unauthenticated-access-of-livestream-and-download-of-video-recordings",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313648",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313648",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.595452",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6532",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T00:15:26.213",
"lastModified": "2025-06-24T00:15:26.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in NOYAFA/Xiami LF9 Pro up to 20250611. Affected by this vulnerability is an unknown functionality of the component RTSP Live Video Stream Endpoint. The manipulation leads to improper access controls. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. This dashcam is distributed by multiple resellers and different names."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 3.3,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/geo-chen/LF9",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/geo-chen/LF9?tab=readme-ov-file#finding-1-unauthenticated-access-of-livestream-and-download-of-video-recordings",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313651",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313651",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.595453",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6533",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T00:15:26.397",
"lastModified": "2025-06-24T00:15:26.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in xxyopen/201206030 novel-plus up to 5.1.3. Affected by this issue is the function ajaxLogin of the file novel-admin/src/main/java/com/java2nb/system/controller/LoginController.java of the component CATCHA Handler. The manipulation leads to authentication bypass by capture-replay. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"baseScore": 5.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-294"
}
]
}
],
"references": [
{
"url": "https://blog.0xd00.com/blog/captcha-replay-attack-lead-to-brute-force-protection-bypass",
"source": "cna@vuldb.com"
},
{
"url": "https://blog.0xd00.com/blog/captcha-replay-attack-lead-to-brute-force-protection-bypass#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313652",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313652",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596481",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6534",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T01:15:25.303",
"lastModified": "2025-06-24T01:15:25.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in xxyopen/201206030 novel-plus up to 5.1.3. This affects the function remove of the file novel-admin/src/main/java/com/java2nb/common/controller/FileController.java of the component File Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:P",
"baseScore": 3.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-99"
}
]
}
],
"references": [
{
"url": "https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion",
"source": "cna@vuldb.com"
},
{
"url": "https://blog.0xd00.com/blog/missing-authorization-leads-to-arbitrary-file-deletion#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313653",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313653",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596505",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6535",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T01:15:25.513",
"lastModified": "2025-06-24T01:15:25.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in xxyopen/201206030 novel-plus up to 5.1.3 and classified as critical. This vulnerability affects the function list of the file novel-admin/src/main/resources/mybatis/system/UserMapper.xml of the component User Management Module. The manipulation of the argument sort/order leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure",
"source": "cna@vuldb.com"
},
{
"url": "https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313654",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313654",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596573",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-23T23:55:20.097357+00:00
2025-06-24T02:00:19.482773+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-23T23:15:24.177000+00:00
2025-06-24T01:35:34.217000+00:00
```
### Last Data Feed Release
@ -27,75 +27,62 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-06-23T00:00:04.301397+00:00
2025-06-24T00:00:04.322345+00:00
```
### Total Number of included CVEs
```plain
299128
299140
```
### CVEs added in the last Commit
Recently added CVEs: `26`
Recently added CVEs: `12`
- [CVE-2023-47029](CVE-2023/CVE-2023-470xx/CVE-2023-47029.json) (`2025-06-23T18:15:20.630`)
- [CVE-2023-47030](CVE-2023/CVE-2023-470xx/CVE-2023-47030.json) (`2025-06-23T20:15:27.740`)
- [CVE-2025-23092](CVE-2025/CVE-2025-230xx/CVE-2025-23092.json) (`2025-06-23T21:15:24.460`)
- [CVE-2025-2828](CVE-2025/CVE-2025-28xx/CVE-2025-2828.json) (`2025-06-23T21:15:25.210`)
- [CVE-2025-44528](CVE-2025/CVE-2025-445xx/CVE-2025-44528.json) (`2025-06-23T20:15:27.880`)
- [CVE-2025-48026](CVE-2025/CVE-2025-480xx/CVE-2025-48026.json) (`2025-06-23T20:15:28.007`)
- [CVE-2025-49126](CVE-2025/CVE-2025-491xx/CVE-2025-49126.json) (`2025-06-23T18:15:21.517`)
- [CVE-2025-49144](CVE-2025/CVE-2025-491xx/CVE-2025-49144.json) (`2025-06-23T19:15:23.727`)
- [CVE-2025-49574](CVE-2025/CVE-2025-495xx/CVE-2025-49574.json) (`2025-06-23T20:15:28.170`)
- [CVE-2025-50348](CVE-2025/CVE-2025-503xx/CVE-2025-50348.json) (`2025-06-23T19:15:24.647`)
- [CVE-2025-50349](CVE-2025/CVE-2025-503xx/CVE-2025-50349.json) (`2025-06-23T19:15:24.787`)
- [CVE-2025-52558](CVE-2025/CVE-2025-525xx/CVE-2025-52558.json) (`2025-06-23T21:15:26.423`)
- [CVE-2025-52561](CVE-2025/CVE-2025-525xx/CVE-2025-52561.json) (`2025-06-23T21:15:26.570`)
- [CVE-2025-52562](CVE-2025/CVE-2025-525xx/CVE-2025-52562.json) (`2025-06-23T21:15:26.710`)
- [CVE-2025-6517](CVE-2025/CVE-2025-65xx/CVE-2025-6517.json) (`2025-06-23T18:15:22.797`)
- [CVE-2025-6518](CVE-2025/CVE-2025-65xx/CVE-2025-6518.json) (`2025-06-23T19:15:25.007`)
- [CVE-2025-6524](CVE-2025/CVE-2025-65xx/CVE-2025-6524.json) (`2025-06-23T21:15:27.970`)
- [CVE-2025-6525](CVE-2025/CVE-2025-65xx/CVE-2025-6525.json) (`2025-06-23T22:15:22.697`)
- [CVE-2025-6526](CVE-2025/CVE-2025-65xx/CVE-2025-6526.json) (`2025-06-23T22:15:22.930`)
- [CVE-2025-6527](CVE-2025/CVE-2025-65xx/CVE-2025-6527.json) (`2025-06-23T22:15:23.130`)
- [CVE-2025-6528](CVE-2025/CVE-2025-65xx/CVE-2025-6528.json) (`2025-06-23T23:15:23.783`)
- [CVE-2025-6529](CVE-2025/CVE-2025-65xx/CVE-2025-6529.json) (`2025-06-23T23:15:23.980`)
- [CVE-2025-6530](CVE-2025/CVE-2025-65xx/CVE-2025-6530.json) (`2025-06-23T23:15:24.177`)
- [CVE-2025-6545](CVE-2025/CVE-2025-65xx/CVE-2025-6545.json) (`2025-06-23T19:15:25.220`)
- [CVE-2025-6547](CVE-2025/CVE-2025-65xx/CVE-2025-6547.json) (`2025-06-23T19:15:25.390`)
- [CVE-2025-34031](CVE-2025/CVE-2025-340xx/CVE-2025-34031.json) (`2025-06-24T01:15:23.340`)
- [CVE-2025-34032](CVE-2025/CVE-2025-340xx/CVE-2025-34032.json) (`2025-06-24T01:15:24.350`)
- [CVE-2025-34033](CVE-2025/CVE-2025-340xx/CVE-2025-34033.json) (`2025-06-24T01:15:24.493`)
- [CVE-2025-34034](CVE-2025/CVE-2025-340xx/CVE-2025-34034.json) (`2025-06-24T01:15:24.630`)
- [CVE-2025-34035](CVE-2025/CVE-2025-340xx/CVE-2025-34035.json) (`2025-06-24T01:15:24.763`)
- [CVE-2025-34036](CVE-2025/CVE-2025-340xx/CVE-2025-34036.json) (`2025-06-24T01:15:24.903`)
- [CVE-2025-34037](CVE-2025/CVE-2025-340xx/CVE-2025-34037.json) (`2025-06-24T01:15:25.037`)
- [CVE-2025-6531](CVE-2025/CVE-2025-65xx/CVE-2025-6531.json) (`2025-06-24T00:15:25.917`)
- [CVE-2025-6532](CVE-2025/CVE-2025-65xx/CVE-2025-6532.json) (`2025-06-24T00:15:26.213`)
- [CVE-2025-6533](CVE-2025/CVE-2025-65xx/CVE-2025-6533.json) (`2025-06-24T00:15:26.397`)
- [CVE-2025-6534](CVE-2025/CVE-2025-65xx/CVE-2025-6534.json) (`2025-06-24T01:15:25.303`)
- [CVE-2025-6535](CVE-2025/CVE-2025-65xx/CVE-2025-6535.json) (`2025-06-24T01:15:25.513`)
### CVEs modified in the last Commit
Recently modified CVEs: `532`
Recently modified CVEs: `29`
- [CVE-2025-6482](CVE-2025/CVE-2025-64xx/CVE-2025-6482.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6483](CVE-2025/CVE-2025-64xx/CVE-2025-6483.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6484](CVE-2025/CVE-2025-64xx/CVE-2025-6484.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6485](CVE-2025/CVE-2025-64xx/CVE-2025-6485.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6486](CVE-2025/CVE-2025-64xx/CVE-2025-6486.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6487](CVE-2025/CVE-2025-64xx/CVE-2025-6487.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6489](CVE-2025/CVE-2025-64xx/CVE-2025-6489.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6490](CVE-2025/CVE-2025-64xx/CVE-2025-6490.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6492](CVE-2025/CVE-2025-64xx/CVE-2025-6492.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6493](CVE-2025/CVE-2025-64xx/CVE-2025-6493.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6494](CVE-2025/CVE-2025-64xx/CVE-2025-6494.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6496](CVE-2025/CVE-2025-64xx/CVE-2025-6496.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6497](CVE-2025/CVE-2025-64xx/CVE-2025-6497.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6498](CVE-2025/CVE-2025-64xx/CVE-2025-6498.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6499](CVE-2025/CVE-2025-64xx/CVE-2025-6499.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6500](CVE-2025/CVE-2025-65xx/CVE-2025-6500.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6501](CVE-2025/CVE-2025-65xx/CVE-2025-6501.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6502](CVE-2025/CVE-2025-65xx/CVE-2025-6502.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6503](CVE-2025/CVE-2025-65xx/CVE-2025-6503.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6509](CVE-2025/CVE-2025-65xx/CVE-2025-6509.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6510](CVE-2025/CVE-2025-65xx/CVE-2025-6510.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6511](CVE-2025/CVE-2025-65xx/CVE-2025-6511.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6512](CVE-2025/CVE-2025-65xx/CVE-2025-6512.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6513](CVE-2025/CVE-2025-65xx/CVE-2025-6513.json) (`2025-06-23T20:16:21.633`)
- [CVE-2025-6516](CVE-2025/CVE-2025-65xx/CVE-2025-6516.json) (`2025-06-23T20:16:21.633`)
- [CVE-2024-40113](CVE-2024/CVE-2024-401xx/CVE-2024-40113.json) (`2025-06-24T01:00:53.330`)
- [CVE-2024-40114](CVE-2024/CVE-2024-401xx/CVE-2024-40114.json) (`2025-06-24T00:59:48.440`)
- [CVE-2024-40494](CVE-2024/CVE-2024-404xx/CVE-2024-40494.json) (`2025-06-24T01:11:48.770`)
- [CVE-2024-41712](CVE-2024/CVE-2024-417xx/CVE-2024-41712.json) (`2025-06-24T01:30:56.780`)
- [CVE-2024-41714](CVE-2024/CVE-2024-417xx/CVE-2024-41714.json) (`2025-06-24T01:29:55.607`)
- [CVE-2024-46478](CVE-2024/CVE-2024-464xx/CVE-2024-46478.json) (`2025-06-24T01:09:04.613`)
- [CVE-2024-47224](CVE-2024/CVE-2024-472xx/CVE-2024-47224.json) (`2025-06-24T01:21:34.700`)
- [CVE-2024-50658](CVE-2024/CVE-2024-506xx/CVE-2024-50658.json) (`2025-06-24T00:17:53.820`)
- [CVE-2024-50931](CVE-2024/CVE-2024-509xx/CVE-2024-50931.json) (`2025-06-24T00:38:36.073`)
- [CVE-2024-51165](CVE-2024/CVE-2024-511xx/CVE-2024-51165.json) (`2025-06-24T00:37:18.360`)
- [CVE-2024-55008](CVE-2024/CVE-2024-550xx/CVE-2024-55008.json) (`2025-06-24T00:19:17.740`)
- [CVE-2024-55089](CVE-2024/CVE-2024-550xx/CVE-2024-55089.json) (`2025-06-24T00:32:09.147`)
- [CVE-2024-56737](CVE-2024/CVE-2024-567xx/CVE-2024-56737.json) (`2025-06-24T00:30:45.817`)
- [CVE-2024-56738](CVE-2024/CVE-2024-567xx/CVE-2024-56738.json) (`2025-06-24T00:29:03.183`)
- [CVE-2024-57427](CVE-2024/CVE-2024-574xx/CVE-2024-57427.json) (`2025-06-24T00:13:56.393`)
- [CVE-2024-57428](CVE-2024/CVE-2024-574xx/CVE-2024-57428.json) (`2025-06-24T00:13:30.770`)
- [CVE-2024-57429](CVE-2024/CVE-2024-574xx/CVE-2024-57429.json) (`2025-06-24T00:13:05.303`)
- [CVE-2024-57430](CVE-2024/CVE-2024-574xx/CVE-2024-57430.json) (`2025-06-24T00:12:38.623`)
- [CVE-2025-26136](CVE-2025/CVE-2025-261xx/CVE-2025-26136.json) (`2025-06-24T00:54:20.497`)
- [CVE-2025-26319](CVE-2025/CVE-2025-263xx/CVE-2025-26319.json) (`2025-06-24T00:50:39.497`)
- [CVE-2025-27622](CVE-2025/CVE-2025-276xx/CVE-2025-27622.json) (`2025-06-24T00:48:40.867`)
- [CVE-2025-27623](CVE-2025/CVE-2025-276xx/CVE-2025-27623.json) (`2025-06-24T00:46:38.817`)
- [CVE-2025-27624](CVE-2025/CVE-2025-276xx/CVE-2025-27624.json) (`2025-06-24T00:45:20.613`)
- [CVE-2025-27625](CVE-2025/CVE-2025-276xx/CVE-2025-27625.json) (`2025-06-24T00:42:16.010`)
- [CVE-2025-5777](CVE-2025/CVE-2025-57xx/CVE-2025-5777.json) (`2025-06-24T01:15:25.177`)
## Download and Usage

1186
_state.csv

File diff suppressed because it is too large Load Diff