diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36636.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36636.json new file mode 100644 index 00000000000..27a2335e10e --- /dev/null +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36636.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2023-36636", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:25.653", + "lastModified": "2025-06-12T03:15:25.653", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json b/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json index c675cf72f14..ac8f4a25234 100644 --- a/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json +++ b/CVE-2025/CVE-2025-330xx/CVE-2025-33053.json @@ -2,8 +2,8 @@ "id": "CVE-2025-33053", "sourceIdentifier": "secure@microsoft.com", "published": "2025-06-10T17:22:18.853", - "lastModified": "2025-06-11T20:32:30.883", - "vulnStatus": "Analyzed", + "lastModified": "2025-06-12T02:15:25.960", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -46,7 +46,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -237,6 +237,26 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://research.checkpoint.com/2025/stealth-falcon-zero-day/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.bleepingcomputer.com/news/security/stealth-falcon-hackers-exploited-windows-webdav-zero-day-to-drop-malware/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.darkreading.com/vulnerabilities-threats/stealth-falcon-apt-exploits-microsoft-rce-zero-day-mideast", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.theregister.com/2025/06/10/microsoft_patch_tuesday_june/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49814.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49814.json new file mode 100644 index 00000000000..7030eb3ac2f --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49814.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49814", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:25.863", + "lastModified": "2025-06-12T03:15:25.863", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49815.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49815.json new file mode 100644 index 00000000000..1c423c1fc45 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49815.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49815", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:25.930", + "lastModified": "2025-06-12T03:15:25.930", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49816.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49816.json new file mode 100644 index 00000000000..4e635c58b30 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49816.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49816", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:25.993", + "lastModified": "2025-06-12T03:15:25.993", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49817.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49817.json new file mode 100644 index 00000000000..823ec02ad3d --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49817.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49817", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:26.060", + "lastModified": "2025-06-12T03:15:26.060", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49818.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49818.json new file mode 100644 index 00000000000..18b7f881f90 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49818.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49818", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:26.130", + "lastModified": "2025-06-12T03:15:26.130", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49819.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49819.json new file mode 100644 index 00000000000..10b35e42fb9 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49819.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49819", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:26.190", + "lastModified": "2025-06-12T03:15:26.190", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49820.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49820.json new file mode 100644 index 00000000000..adbba8b91aa --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49820.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49820", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:26.253", + "lastModified": "2025-06-12T03:15:26.253", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49821.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49821.json new file mode 100644 index 00000000000..fa388be48e5 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49821.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49821", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:26.313", + "lastModified": "2025-06-12T03:15:26.313", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-498xx/CVE-2025-49822.json b/CVE-2025/CVE-2025-498xx/CVE-2025-49822.json new file mode 100644 index 00000000000..6e4881c0b52 --- /dev/null +++ b/CVE-2025/CVE-2025-498xx/CVE-2025-49822.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-49822", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-06-12T03:15:26.380", + "lastModified": "2025-06-12T03:15:26.380", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Not used" + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6005.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6005.json new file mode 100644 index 00000000000..c83f8afac0b --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6005.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6005", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-12T02:15:27.003", + "lastModified": "2025-06-12T02:15:27.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in kiCode111 like-girl 5.2.0. This vulnerability affects unknown code of the file /admin/aboutPost.php. The manipulation of the argument title/aboutimg/info1/info2/info3/btn1/btn2/infox1/infox2/infox3/infox4/infox5/infox6/btnx2/infof1/infof2/infof3/infof4/btnf3/infod1/infod2/infod3/infod4/infod5 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/adminnerr/cve/issues/6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312328", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312328", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.587540", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6006.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6006.json new file mode 100644 index 00000000000..fd011a678cf --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6006.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6006", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-12T02:15:27.257", + "lastModified": "2025-06-12T02:15:27.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in kiCode111 like-girl 5.2.0. This issue affects some unknown processing of the file /admin/ImgUpdaPost.php. The manipulation of the argument id/imgText/imgDatd/imgUrl leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/adminnerr/cve/issues/10", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/adminnerr/cve/issues/7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312329", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312329", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.587551", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.588090", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6007.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6007.json new file mode 100644 index 00000000000..2690cb88236 --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6007.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6007", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-12T02:15:27.450", + "lastModified": "2025-06-12T02:15:27.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in kiCode111 like-girl 5.2.0. Affected is an unknown function of the file /admin/CopyadminPost.php. The manipulation of the argument icp/Copyright leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/adminnerr/cve/issues/8", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312330", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312330", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.587569", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6008.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6008.json new file mode 100644 index 00000000000..a68e9225838 --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6008.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6008", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-12T02:15:27.647", + "lastModified": "2025-06-12T02:15:27.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in kiCode111 like-girl 5.2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/ImgAddPost.php. The manipulation of the argument imgDatd/imgText/imgUrl leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/adminnerr/cve/issues/9", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312331", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312331", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.588088", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-60xx/CVE-2025-6009.json b/CVE-2025/CVE-2025-60xx/CVE-2025-6009.json new file mode 100644 index 00000000000..41cd6ff5907 --- /dev/null +++ b/CVE-2025/CVE-2025-60xx/CVE-2025-6009.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-6009", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-12T03:15:26.440", + "lastModified": "2025-06-12T03:15:26.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in kiCode111 like-girl 5.2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/ipAddPost.php. The manipulation of the argument bz/ipdz leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/adminnerr/cve/issues/11", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.312332", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.312332", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.588092", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3f5e133298d..50d057ed9db 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-12T02:00:19.465095+00:00 +2025-06-12T04:00:18.957813+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-12T01:15:26.443000+00:00 +2025-06-12T03:15:26.440000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -297751 +297766 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `15` -- [CVE-2022-4976](CVE-2022/CVE-2022-49xx/CVE-2022-4976.json) (`2025-06-12T01:15:25.370`) +- [CVE-2023-36636](CVE-2023/CVE-2023-366xx/CVE-2023-36636.json) (`2025-06-12T03:15:25.653`) +- [CVE-2025-49814](CVE-2025/CVE-2025-498xx/CVE-2025-49814.json) (`2025-06-12T03:15:25.863`) +- [CVE-2025-49815](CVE-2025/CVE-2025-498xx/CVE-2025-49815.json) (`2025-06-12T03:15:25.930`) +- [CVE-2025-49816](CVE-2025/CVE-2025-498xx/CVE-2025-49816.json) (`2025-06-12T03:15:25.993`) +- [CVE-2025-49817](CVE-2025/CVE-2025-498xx/CVE-2025-49817.json) (`2025-06-12T03:15:26.060`) +- [CVE-2025-49818](CVE-2025/CVE-2025-498xx/CVE-2025-49818.json) (`2025-06-12T03:15:26.130`) +- [CVE-2025-49819](CVE-2025/CVE-2025-498xx/CVE-2025-49819.json) (`2025-06-12T03:15:26.190`) +- [CVE-2025-49820](CVE-2025/CVE-2025-498xx/CVE-2025-49820.json) (`2025-06-12T03:15:26.253`) +- [CVE-2025-49821](CVE-2025/CVE-2025-498xx/CVE-2025-49821.json) (`2025-06-12T03:15:26.313`) +- [CVE-2025-49822](CVE-2025/CVE-2025-498xx/CVE-2025-49822.json) (`2025-06-12T03:15:26.380`) +- [CVE-2025-6005](CVE-2025/CVE-2025-60xx/CVE-2025-6005.json) (`2025-06-12T02:15:27.003`) +- [CVE-2025-6006](CVE-2025/CVE-2025-60xx/CVE-2025-6006.json) (`2025-06-12T02:15:27.257`) +- [CVE-2025-6007](CVE-2025/CVE-2025-60xx/CVE-2025-6007.json) (`2025-06-12T02:15:27.450`) +- [CVE-2025-6008](CVE-2025/CVE-2025-60xx/CVE-2025-6008.json) (`2025-06-12T02:15:27.647`) +- [CVE-2025-6009](CVE-2025/CVE-2025-60xx/CVE-2025-6009.json) (`2025-06-12T03:15:26.440`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -- [CVE-2025-4215](CVE-2025/CVE-2025-42xx/CVE-2025-4215.json) (`2025-06-12T01:15:26.443`) +- [CVE-2025-33053](CVE-2025/CVE-2025-330xx/CVE-2025-33053.json) (`2025-06-12T02:15:25.960`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 68ba74ad851..fa7e41dbad4 100644 --- a/_state.csv +++ b/_state.csv @@ -214224,7 +214224,7 @@ CVE-2022-49756,0,0,28920c36f39ed7319bcb4d4236e8245608208e3f90c3360954d712de1c536 CVE-2022-49757,0,0,f8d513bb3408f94b37dd44d9f1e8f5e5feb62b8907acb8142b1365c9258f9ce5,2025-04-15T14:51:20.980000 CVE-2022-49758,0,0,13ab6803b3172e199b2b62b8f0fd070e3b7f408e7b5f310b0914ea640333e00f,2025-04-15T14:51:37.410000 CVE-2022-49759,0,0,16c0668f206f3a39bb8bc5a0a0a170615639fe2527f287f643903901252e5edc,2025-04-15T14:51:51.090000 -CVE-2022-4976,1,1,be24aa3c0c7c31a50f042b4530f556216a52f344ceea264aeffd07e43efa1f2a,2025-06-12T01:15:25.370000 +CVE-2022-4976,0,0,be24aa3c0c7c31a50f042b4530f556216a52f344ceea264aeffd07e43efa1f2a,2025-06-12T01:15:25.370000 CVE-2022-49760,0,0,174c6ebf6ffdba46560ee57082a10e2bd736443de432b3c57d79e8c3a863f4d9,2025-03-28T18:11:49.747000 CVE-2022-49761,0,0,182b2acd2b419d0dc6631691801e74dd45ce3a727bffa39bafb3990c4066bd75,2025-04-01T15:40:43.063000 CVE-2022-49762,0,0,ccaf97e765af5278ad3af6c562d2944eabb4eac5592b6d3bbb9bf7ef819843d2,2025-05-02T13:53:20.943000 @@ -229636,6 +229636,7 @@ CVE-2023-36632,0,0,46f0a11144759b5909ed4794ca8b1a0718259a75dd91e88f4ae2fd0f2dc88 CVE-2023-36633,0,0,b888a5e7e14f18975a1ac1d63d28793205be2b53fcb147e20732f7773435a7e2,2024-11-21T08:10:08.090000 CVE-2023-36634,0,0,36f4846be9fb6c66e20d01119da8f95636579f632ba66436395b4f5833afa6af,2024-11-21T08:10:08.287000 CVE-2023-36635,0,0,e4e3e0d9a4d82b21e78b4da6876cd64c23273e9fabe110e9aa80678cef71b003,2024-11-21T08:10:08.487000 +CVE-2023-36636,1,1,02e0d35f2c72a6b3f8ff3738c3b8dfe490e7db972441ddd88987be6876f96db1,2025-06-12T03:15:25.653000 CVE-2023-36637,0,0,ba73f423a2693d3bfccbe2b0eaf77bdc7801b672207464b67290683a94483a13,2024-11-21T08:10:08.700000 CVE-2023-36638,0,0,ebe9e11e948337aac9101ef564190ca1e06bb9c379c16a3b1ee414b4995871dd,2024-11-21T08:10:08.903000 CVE-2023-36639,0,0,16e359113daab4316b44b6e6e0a402c81e0ebf175bccb493d33434c5c768e5f6,2024-11-21T08:10:09.100000 @@ -293081,7 +293082,7 @@ CVE-2025-33043,0,0,044f6c7834f7eed1d82fb6b8377e155f5c1ae51cb36f952b6bba03be184e2 CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000 CVE-2025-33050,0,0,05e6d757b225696d2814d59d4f1c971c8d0e7d5b6ad7a1f98f3325b5ab9caf61,2025-06-10T17:22:12.643000 CVE-2025-33052,0,0,b1993549d564c5c9981bc4b05cb64d0a2d456f60ff295f87620c17f2cd44433b,2025-06-10T17:22:16.713000 -CVE-2025-33053,0,0,35eca878d45ff901bc5d4593eca663dfcefca7af7899681bd5a130667f4cff54,2025-06-11T20:32:30.883000 +CVE-2025-33053,0,1,28ef1a484374e74e5c41606acd67ac44b7804ef923d338ce7e95d21124db32dc,2025-06-12T02:15:25.960000 CVE-2025-33055,0,0,13d9e39692b08b1b320db5a5ecccbe43815806407f2b3cc535308d642cb2e613,2025-06-10T17:22:21.100000 CVE-2025-33056,0,0,c67dfbe06f555af10b25758d9a6160cb2f910935ced8e27cd9da40fc740b6166,2025-06-10T17:22:23.163000 CVE-2025-33057,0,0,205438b56590147889b44322c2f014a7f7d594c5c377234a2f1d03b95a58afc8,2025-06-10T17:22:25.360000 @@ -294582,7 +294583,7 @@ CVE-2025-4210,0,0,75198efe0de18159aec1a87785e7e16a89c8de06da580116a7e14d570aed6e CVE-2025-4211,0,0,404e0b904354aed3b5baa7e207d5cfca573f55dcef658a41b4b3c736c556ad3a,2025-05-16T14:42:18.700000 CVE-2025-4213,0,0,ebe18be5ee5e37fbd0ec843f8652f96ea5e7e69c1b8a34e3e1bad241a91a7771,2025-05-28T20:56:16.840000 CVE-2025-4214,0,0,1d60003a6cdf25de6477c856dc27cfd829a89b1b822b87cc832b4debc042c00e,2025-05-28T21:09:07.673000 -CVE-2025-4215,0,1,77be2382f902e198d303780e19aa94df13f88e4e0b8ba79572846b911ad2ad55,2025-06-12T01:15:26.443000 +CVE-2025-4215,0,0,77be2382f902e198d303780e19aa94df13f88e4e0b8ba79572846b911ad2ad55,2025-06-12T01:15:26.443000 CVE-2025-4217,0,0,62c15aedce5780b22253f9cbd9800a9e9b8ad351bc24efee5e47483ed5db566c,2025-05-21T20:24:58.133000 CVE-2025-4218,0,0,2c49204cc3b286450f9a71e19a17dbb76984ced9134a20a4535356e38fc3ed60,2025-05-05T20:54:19.760000 CVE-2025-4219,0,0,1dbb3268c116fdb31206945d2c84e6a62b85afd7dbbb78abb2fd21bb825a5ad4,2025-05-21T20:24:58.133000 @@ -297070,6 +297071,15 @@ CVE-2025-49791,0,0,c8405bee0682e54627b1129d1bbc31f4fc38b15adb607d01d4c489d218bdf CVE-2025-49792,0,0,92d32f298ce5eac66a29fd03922b03d39deb71f8c19e93f3b95048029b8b5bce,2025-06-11T03:15:22.587000 CVE-2025-49793,0,0,25d57e0b9df99cf6003be5aeef6975cbd58104035f2746b28b6910725b1e9c25,2025-06-11T03:15:22.650000 CVE-2025-4980,0,0,8aa1adb8a90611d76764e2b7dd4eacd1e1573f12338bc98504352a5bc77529f4,2025-05-21T20:25:16.407000 +CVE-2025-49814,1,1,cd4c594b4458e6b3d192baa2131b995abe59dca872f59a22339c83ab6246bc09,2025-06-12T03:15:25.863000 +CVE-2025-49815,1,1,ab5c799920620d5e4f9d9b43a2af946d17b69db748ce4d8b6a328cb8d7b9eff6,2025-06-12T03:15:25.930000 +CVE-2025-49816,1,1,1a16c5d0bd92adeb24c6c00f18c773a3281420da1014560ce74b2134aedf4c77,2025-06-12T03:15:25.993000 +CVE-2025-49817,1,1,872f5b1e64e62ecc00ace6775e58c1c6e923863a38a44112235038434d01e270,2025-06-12T03:15:26.060000 +CVE-2025-49818,1,1,28c46991b84648213dae298517ce3d86257a519406960c3a74fcaee32b3df5cc,2025-06-12T03:15:26.130000 +CVE-2025-49819,1,1,7aa65990a8586863dec28602b60bc509a93e8d9398355850f5f946a77668ae67,2025-06-12T03:15:26.190000 +CVE-2025-49820,1,1,d7fb37bdf3c3fdfcda4dd8d8b01573c4b600a96f8a0f40a4d07204fb70c71c9e,2025-06-12T03:15:26.253000 +CVE-2025-49821,1,1,bb9317c9c4768a7b0a634d8319ed4d699208a76952e4829f60bbc2af06ca64a6,2025-06-12T03:15:26.313000 +CVE-2025-49822,1,1,de49443b576bc1f584b5a6900459b73ba17d0494708f2396f6ea98c8b4c73b58,2025-06-12T03:15:26.380000 CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000 CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000 CVE-2025-4985,0,0,88151f8f37213547b95261cc34f75717fde2a8ef982c36b2d93a8904176e3178,2025-05-30T16:31:03.107000 @@ -297750,3 +297760,8 @@ CVE-2025-5986,0,0,1990e16fb8c462afd3f99f716f6335400ec441a8016940956e56aaac259aed CVE-2025-5991,0,0,63a683acbdc0ee08246e1a037b74c64c0c9a5c11210d84e35e546c14a58c12d4,2025-06-11T08:15:22.933000 CVE-2025-6001,0,0,c9b7eb3d382fd54143b08408c095c16699126f69c9dd9750294fd76e92c98b78,2025-06-11T17:15:43.107000 CVE-2025-6002,0,0,8c1374a0c8e3544ed26d66f3f8a4f4b27954c551937c301e1e393dc76cf99fd3,2025-06-11T17:15:43.253000 +CVE-2025-6005,1,1,366d25ebcb53dfe66e33951ebc9a745253460fd409d08437bc002b8cf8d68de7,2025-06-12T02:15:27.003000 +CVE-2025-6006,1,1,7981f3212d97405b700f64e6972e976c904091cc8c59a647a48840fa82809d8d,2025-06-12T02:15:27.257000 +CVE-2025-6007,1,1,e8e40986d8ff431e7812cbcfaf44fb31f9a0af8904d89dbad9dd5bb073eb0a57,2025-06-12T02:15:27.450000 +CVE-2025-6008,1,1,5b42087edd598723437521376ab07bd156ff9c324caa33222251e66395845466,2025-06-12T02:15:27.647000 +CVE-2025-6009,1,1,6bd0b9792d810fe9d6cd0b2977a3732b6ef66ee0bf0f30fa9efbf468941f9052,2025-06-12T03:15:26.440000