mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
Compare commits
4 Commits
9a63d2d0bb
...
e71791cf3c
Author | SHA1 | Date | |
---|---|---|---|
![]() |
e71791cf3c | ||
![]() |
eb2a834952 | ||
![]() |
f9bdb6cb00 | ||
![]() |
c7c5de384e |
16
CVE-2023/CVE-2023-418xx/CVE-2023-41839.json
Normal file
16
CVE-2023/CVE-2023-418xx/CVE-2023-41839.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2023-41839",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:31.777",
|
||||
"lastModified": "2025-05-28T04:15:31.777",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3669",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-30T06:15:02.487",
|
||||
"lastModified": "2024-11-21T09:30:08.690",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-05-28T00:54:09.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.7.2",
|
||||
"matchCriteriaId": "A76C0322-9500-4EB6-B10C-4574C576EB7C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4096",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-30T06:15:02.723",
|
||||
"lastModified": "2024-11-21T09:42:11.190",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-05-28T00:52:03.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpdarko:responsive_tabs:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.0.11",
|
||||
"matchCriteriaId": "6B431159-10A9-4EB8-9E3A-1A3C3AE3672F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,80 @@
|
||||
"id": "CVE-2024-48702",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-23T15:15:22.910",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:40:19.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PHPGurukul Old Age Home Management System v1.0 is vulnerable to HTML Injection via the searchdata parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "PHPGurukul Old Age Home Management System v1.0 es vulnerable a la inyecci\u00f3n de HTML a trav\u00e9s del par\u00e1metro searchdata."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:old_age_home_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE1696E8-13EF-409E-BF90-C092ABEDFE50"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,80 @@
|
||||
"id": "CVE-2024-51101",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-23T15:15:23.093",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:42:23.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PHPGURUKUL Restaurant Table Booking System using PHP and MySQL v1.0 was discovered to contain a SQL injection vulnerability via the searchdata parameter at /rtbs/check-status.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que HPGURUKUL Restaurant Table Booking System que utiliza PHP y MySQL v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro searchdata en /rtbs/check-status.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02963BE3-61BC-41D5-82BA-71B773AA8FA0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Restaurant%20Table%20Booking%20System%20using%20PHP%20and%20MySQL/SQL%20Injection-Search.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51106",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-19T15:15:22.583",
|
||||
"lastModified": "2025-05-21T20:25:33.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:00:45.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-About%20Us.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,80 @@
|
||||
"id": "CVE-2024-51107",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-23T15:15:23.267",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:44:54.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /mcgs/admin/contactus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle, pagedes, and email parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en el componente /mcgs/admin/contactus.php de PHPGURUKUL Medical Card Generation System que utiliza PHP y MySQL v1.0 permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los par\u00e1metros pagetitle, pagedes y email."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Contact%20Us.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,80 @@
|
||||
"id": "CVE-2024-51108",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-05-23T15:15:23.440",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:44:07.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /admin/card-bwdates-report.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the fromdate and todate parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en el componente /admin/card-bwdates-report.php de PHPGURUKUL Medical Card Generation System que utiliza PHP y MySQL v1.0 permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los par\u00e1metros fromdate y todate."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Between%20Dates%20Reports.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5765",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-30T06:15:02.823",
|
||||
"lastModified": "2024-11-21T09:48:18.090",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-05-28T00:51:15.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpstickybar:wpstickybar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1.0",
|
||||
"matchCriteriaId": "8A1E549D-DFF7-4E99-950B-DD3E7B510DAC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5807",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-30T06:15:02.917",
|
||||
"lastModified": "2024-11-21T09:48:22.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-05-28T00:50:36.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,51 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esterox:business_card:1.0.0:*:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "FB387573-2EBF-44FB-8B7F-F9D721E6CFC4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5808",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-30T06:15:03.070",
|
||||
"lastModified": "2024-11-21T09:48:22.213",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-05-28T00:49:06.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:masdiblogs:wp_ajax_contact_form:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.2",
|
||||
"matchCriteriaId": "06F5E471-517C-49CA-9F13-AA736C4BC7C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5809",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-30T06:15:03.180",
|
||||
"lastModified": "2024-11-21T09:48:22.387",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-05-28T00:46:20.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:masdiblogs:wp_ajax_contact_form:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.2",
|
||||
"matchCriteriaId": "06F5E471-517C-49CA-9F13-AA736C4BC7C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5975",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-30T06:15:03.277",
|
||||
"lastModified": "2024-11-21T09:48:40.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T00:42:32.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:contrive:cz_loan_management:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1",
|
||||
"matchCriteriaId": "017403BA-0D67-447D-B098-EB04B99796DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-250xx/CVE-2025-25025.json
Normal file
56
CVE-2025/CVE-2025-250xx/CVE-2025-25025.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-25025",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-05-28T02:15:20.417",
|
||||
"lastModified": "2025-05-28T02:15:20.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Guardium 12.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7234827",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-250xx/CVE-2025-25026.json
Normal file
56
CVE-2025/CVE-2025-250xx/CVE-2025-25026.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-25026",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-05-28T02:15:20.583",
|
||||
"lastModified": "2025-05-28T02:15:20.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Guardium 12.0 could allow an authenticated user to obtain sensitive information due to an incorrect authentication check."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7234827",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-250xx/CVE-2025-25029.json
Normal file
56
CVE-2025/CVE-2025-250xx/CVE-2025-25029.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-25029",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-05-28T02:15:20.753",
|
||||
"lastModified": "2025-05-28T02:15:20.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Guardium 12.0 could allow a privileged user to download any file on the system due to improper escaping of input."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7234827",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-3710",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-05-09T04:16:10.820",
|
||||
"lastModified": "2025-05-12T17:32:52.810",
|
||||
"lastModified": "2025-05-28T03:15:21.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-3711",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-05-09T04:16:11.110",
|
||||
"lastModified": "2025-05-12T17:32:52.810",
|
||||
"lastModified": "2025-05-28T03:15:22.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-3712",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-05-09T04:16:12.170",
|
||||
"lastModified": "2025-05-12T17:32:52.810",
|
||||
"lastModified": "2025-05-28T03:15:22.310",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-3713",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-05-09T04:16:12.327",
|
||||
"lastModified": "2025-05-12T17:32:52.810",
|
||||
"lastModified": "2025-05-28T03:15:22.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-3714",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-05-09T04:16:12.483",
|
||||
"lastModified": "2025-05-12T17:32:52.810",
|
||||
"lastModified": "2025-05-28T04:15:45.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
|
||||
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
82
CVE-2025/CVE-2025-40xx/CVE-2025-4009.json
Normal file
82
CVE-2025/CVE-2025-40xx/CVE-2025-4009.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-4009",
|
||||
"sourceIdentifier": "research@onekey.com",
|
||||
"published": "2025-05-28T07:15:24.490",
|
||||
"lastModified": "2025-05-28T07:15:24.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Evertz SVDN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a\u00a0web management interface on port 80. This web management interface can be used by administrators to control product\nfeatures, setup network switching, and register license among other features. The application has been developed in PHP with\u00a0the webEASY SDK, also named \u2018ewb\u2019 by Evertz.\n\nThis web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.\n\nRemote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.\n\nThis level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "research@onekey.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:C/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NEGLIGIBLE",
|
||||
"Automatable": "YES",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "research@onekey.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009",
|
||||
"source": "research@onekey.com"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2025/CVE-2025-488xx/CVE-2025-48841.json
Normal file
16
CVE-2025/CVE-2025-488xx/CVE-2025-48841.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-48841",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:46.770",
|
||||
"lastModified": "2025-05-28T04:15:46.770",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-488xx/CVE-2025-48842.json
Normal file
16
CVE-2025/CVE-2025-488xx/CVE-2025-48842.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-48842",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:47.390",
|
||||
"lastModified": "2025-05-28T04:15:47.390",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-488xx/CVE-2025-48843.json
Normal file
16
CVE-2025/CVE-2025-488xx/CVE-2025-48843.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-48843",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:49.640",
|
||||
"lastModified": "2025-05-28T04:15:49.640",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-488xx/CVE-2025-48844.json
Normal file
16
CVE-2025/CVE-2025-488xx/CVE-2025-48844.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-48844",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:49.917",
|
||||
"lastModified": "2025-05-28T04:15:49.917",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-488xx/CVE-2025-48845.json
Normal file
16
CVE-2025/CVE-2025-488xx/CVE-2025-48845.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-48845",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:49.990",
|
||||
"lastModified": "2025-05-28T04:15:49.990",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-488xx/CVE-2025-48846.json
Normal file
16
CVE-2025/CVE-2025-488xx/CVE-2025-48846.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-48846",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:50.067",
|
||||
"lastModified": "2025-05-28T04:15:50.067",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-488xx/CVE-2025-48847.json
Normal file
16
CVE-2025/CVE-2025-488xx/CVE-2025-48847.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-48847",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:50.140",
|
||||
"lastModified": "2025-05-28T04:15:50.140",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-488xx/CVE-2025-48848.json
Normal file
16
CVE-2025/CVE-2025-488xx/CVE-2025-48848.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-48848",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-05-28T04:15:50.207",
|
||||
"lastModified": "2025-05-28T04:15:50.207",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
68
CVE-2025/CVE-2025-48xx/CVE-2025-4800.json
Normal file
68
CVE-2025/CVE-2025-48xx/CVE-2025-4800.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-4800",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-05-28T06:15:22.000",
|
||||
"lastModified": "2025-05-28T06:15:22.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.stylemixthemes.com/masterstudy-lms/changelog-pro-version",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://stylemixthemes.com/wordpress-lms-plugin/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themeforest.net/item/masterstudy-education-center-wordpress-theme/12170274/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c170a228-4abd-4ee6-ba37-bdcde1cb7fc5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4816",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-17T04:16:20.577",
|
||||
"lastModified": "2025-05-19T16:15:33.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T00:59:43.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xiaoyi-ing/CVE/issues/8",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309273",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309273",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.574129",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Xiaoyi-ing/CVE/issues/8",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4817",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-17T04:16:20.797",
|
||||
"lastModified": "2025-05-19T16:15:33.977",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T00:59:22.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xiaoyi-ing/CVE/issues/9",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309274",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309274",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.574178",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Xiaoyi-ing/CVE/issues/9",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4818",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-17T05:15:51.597",
|
||||
"lastModified": "2025-05-19T16:15:34.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T00:58:53.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xiaoyi-ing/CVE/issues/10",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309275",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309275",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.574219",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Xiaoyi-ing/CVE/issues/10",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4938",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-19T16:15:36.407",
|
||||
"lastModified": "2025-05-21T20:25:16.407",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:33:36.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WuYanneko/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309500",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309500",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.579848",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4939",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-19T16:15:36.620",
|
||||
"lastModified": "2025-05-21T20:25:16.407",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:32:20.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,82 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:credit_card_application_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0BFAAD8-0306-420B-B06D-F23D04AB2072"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309502",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309502",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.580119",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4941",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-19T17:15:28.883",
|
||||
"lastModified": "2025-05-21T20:25:16.407",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:31:03.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:credit_card_application_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0BFAAD8-0306-420B-B06D-F23D04AB2072"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GIRISH05/Credit-card-application-management-system/blob/main/SQL-Injection.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309504",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309504",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.580167",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-49xx/CVE-2025-4947.json
Normal file
29
CVE-2025/CVE-2025-49xx/CVE-2025-4947.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-4947",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2025-05-28T07:15:24.780",
|
||||
"lastModified": "2025-05-28T07:15:24.780",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://curl.se/docs/CVE-2025-4947.html",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://curl.se/docs/CVE-2025-4947.json",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/3150884",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5002",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-20T22:15:19.410",
|
||||
"lastModified": "2025-05-21T20:24:58.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:25:25.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFE80DE6-C79F-452F-9523-4EC1F9777DA4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/laifeng-boy/cve/issues/5",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309657",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309657",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.580192",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/laifeng-boy/cve/issues/5",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5003",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-20T22:15:19.600",
|
||||
"lastModified": "2025-05-21T20:24:58.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:24:21.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,78 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/huangyi234/CVE/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309658",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309658",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.580195",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/huangyi234/CVE/issues/4",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5004",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-20T23:15:19.530",
|
||||
"lastModified": "2025-05-21T20:24:58.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:20:50.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,77 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/huangyi234/CVE/issues/8",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309659",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309659",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.580201",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/huangyi234/CVE/issues/8",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5006",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-20T23:15:19.750",
|
||||
"lastModified": "2025-05-21T20:24:58.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:16:17.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,83 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Zhaozhizhi/CVE/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309660",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309660",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.580248",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Zhaozhizhi/CVE/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5008",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-20T23:15:20.133",
|
||||
"lastModified": "2025-05-21T23:15:55.200",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:06:49.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,77 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hhhanxx/attack/issues/18",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309662",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309662",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.580412",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hhhanxx/attack/issues/18",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-50xx/CVE-2025-5025.json
Normal file
29
CVE-2025/CVE-2025-50xx/CVE-2025-5025.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-5025",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2025-05-28T07:15:24.910",
|
||||
"lastModified": "2025-05-28T07:15:24.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://curl.se/docs/CVE-2025-5025.html",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://curl.se/docs/CVE-2025-5025.json",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/3153497",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5056",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-21T22:15:51.283",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T02:08:30.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jacob-z691/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309877",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309877",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.581373",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Jacob-z691/CVE/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5057",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-21T22:15:51.460",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T02:04:36.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,83 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jacob-z691/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309878",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309878",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.581374",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Jacob-z691/CVE/issues/2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5059",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-21T23:15:55.683",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T02:02:49.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/snkercyber/CVE/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309879",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309879",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.581391",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/snkercyber/CVE/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5077",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-22T14:16:09.230",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:53:25.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,83 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GeniusWang23/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309957",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309957",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.581431",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/GeniusWang23/CVE/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5078",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-22T14:16:09.523",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:52:35.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GeniusWang23/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309958",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309958",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.581432",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/GeniusWang23/CVE/issues/2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5079",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-22T15:16:06.477",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:50:48.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dico-Z/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309959",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309959",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.581439",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5081",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-22T16:15:56.697",
|
||||
"lastModified": "2025-05-23T15:55:02.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-05-28T01:49:27.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,84 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:cybercafe_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76B02852-BBA6-49C7-82F9-A92F2DBFC0A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wzylky/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309961",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309961",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.582065",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wzylky/CVE/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5278",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-05-27T21:15:23.197",
|
||||
"lastModified": "2025-05-27T21:15:23.197",
|
||||
"lastModified": "2025-05-28T01:15:19.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368764",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/05/27/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-05-27T23:55:19.472504+00:00
|
||||
2025-05-28T08:00:19.223224+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-05-27T23:15:21.400000+00:00
|
||||
2025-05-28T07:15:24.910000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,27 +27,23 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-05-27T00:00:04.320074+00:00
|
||||
2025-05-28T00:00:04.313451+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
295654
|
||||
295670
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2022-21150](CVE-2022/CVE-2022-211xx/CVE-2022-21150.json) (`2025-05-27T23:15:19.840`)
|
||||
- [CVE-2022-21200](CVE-2022/CVE-2022-212xx/CVE-2022-21200.json) (`2025-05-27T23:15:20.490`)
|
||||
- [CVE-2024-11185](CVE-2024/CVE-2024-111xx/CVE-2024-11185.json) (`2025-05-27T23:15:20.580`)
|
||||
- [CVE-2024-45094](CVE-2024/CVE-2024-450xx/CVE-2024-45094.json) (`2025-05-27T23:15:21.093`)
|
||||
- [CVE-2025-2796](CVE-2025/CVE-2025-27xx/CVE-2025-2796.json) (`2025-05-27T23:15:21.283`)
|
||||
- [CVE-2025-2826](CVE-2025/CVE-2025-28xx/CVE-2025-2826.json) (`2025-05-27T23:15:21.400`)
|
||||
- [CVE-2025-32440](CVE-2025/CVE-2025-324xx/CVE-2025-32440.json) (`2025-05-27T22:15:21.980`)
|
||||
- [CVE-2025-40911](CVE-2025/CVE-2025-409xx/CVE-2025-40911.json) (`2025-05-27T22:15:22.337`)
|
||||
- [CVE-2025-4009](CVE-2025/CVE-2025-40xx/CVE-2025-4009.json) (`2025-05-28T07:15:24.490`)
|
||||
- [CVE-2025-4800](CVE-2025/CVE-2025-48xx/CVE-2025-4800.json) (`2025-05-28T06:15:22.000`)
|
||||
- [CVE-2025-4947](CVE-2025/CVE-2025-49xx/CVE-2025-4947.json) (`2025-05-28T07:15:24.780`)
|
||||
- [CVE-2025-5025](CVE-2025/CVE-2025-50xx/CVE-2025-5025.json) (`2025-05-28T07:15:24.910`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
104
_state.csv
104
_state.csv
@ -190949,7 +190949,7 @@ CVE-2022-21147,0,0,53d42dff0ef971348abcbc9db3dccf42503f1205f0d61cae322fa8f9ff752
|
||||
CVE-2022-21148,0,0,b4c937e47978f11ca1e16a1b6d1e86246877646fa0a67f66ccb9ef23bf990279,2025-05-05T17:17:39.760000
|
||||
CVE-2022-21149,0,0,f3ae7567f3163786b900eb1a79db504939c5f01724410c388a986c59598624bd,2024-11-21T06:43:59.437000
|
||||
CVE-2022-2115,0,0,3b0bfd60b400c603906316aedf310160bb240d4946ebcce85d7d85bb339ae37f,2024-11-21T07:00:20.630000
|
||||
CVE-2022-21150,1,1,73af99be2ef6a1ec107afd973e876751c4cf1c849a91a5dd04fc97fab1a97ff6,2025-05-27T23:15:19.840000
|
||||
CVE-2022-21150,0,0,73af99be2ef6a1ec107afd973e876751c4cf1c849a91a5dd04fc97fab1a97ff6,2025-05-27T23:15:19.840000
|
||||
CVE-2022-21151,0,0,93b633642443edbb9a618ccace777742cd46371866dc45008734687fd210c4dd,2025-05-05T17:17:40
|
||||
CVE-2022-21152,0,0,b6f1363434b71ccba44723b7c847dbfe5b198e98e7a674346d2e8d4b0c919e50,2025-05-05T17:17:40.817000
|
||||
CVE-2022-21153,0,0,e312384a9ce26d515b19347cf80988cd1c5474a1f90514b58bfd29acb0034b59,2025-05-05T17:17:41.043000
|
||||
@ -190998,7 +190998,7 @@ CVE-2022-21197,0,0,c84dea9b93bfc978b5467cd9a739ece8f41846103bdb2c6925cfc7478a3ef
|
||||
CVE-2022-21198,0,0,1155a641fdf7c6c1229127e6fa4a1cc634cfb76a3942f96e24ba77fb0ceba70d,2025-02-04T18:15:29.893000
|
||||
CVE-2022-21199,0,0,055fbcd11322cba3f7403cdce3bd9e8bbf4128df212ffbe4213a9fc5a19eef15,2024-11-21T06:44:05.567000
|
||||
CVE-2022-2120,0,0,91491aa789c8d3e8f5740c6d2ca2cda651b114390fe24ccd573921c535e94c1f,2024-11-21T07:00:21.197000
|
||||
CVE-2022-21200,1,1,0576b98bc61e8e27aaba7204bd609fefc4e419ef74671c40c0e5fe1246dae388,2025-05-27T23:15:20.490000
|
||||
CVE-2022-21200,0,0,0576b98bc61e8e27aaba7204bd609fefc4e419ef74671c40c0e5fe1246dae388,2025-05-27T23:15:20.490000
|
||||
CVE-2022-21201,0,0,a4e0197e75f2936b3b645b102670e01ddad1b696e4e752b3e65628adb198be0a,2024-11-21T06:44:05.670000
|
||||
CVE-2022-21202,0,0,de1464aa17fa964c60b8c29cf8a7e5dc40be4a6ba7d04f8662a1c3aa6b2bd546,2024-11-21T06:44:05.777000
|
||||
CVE-2022-21203,0,0,54568b987437a847f5d31726a301236c617930ea9392a11177e819c0241828a7,2025-05-05T17:17:43.880000
|
||||
@ -233728,6 +233728,7 @@ CVE-2023-41834,0,0,fe97b040b6a12d18159971f3ffafabcd5d8334236b35f116720f5f615708a
|
||||
CVE-2023-41835,0,0,ce7155b465e140a8e62b26a8d6d86203572f5bdb055ed610039eae08c9aef2e1,2024-11-21T08:21:46.180000
|
||||
CVE-2023-41836,0,0,c3f04a6ef80b01f6ac7cd2e69564f223dd13bbcf85e284392104bb6022b1b1d0,2024-11-21T08:21:46.330000
|
||||
CVE-2023-41838,0,0,952c54aae683059d62b494aadea90c0936995fec7c2c31e60fa8e87d00501e21,2024-11-21T08:21:46.483000
|
||||
CVE-2023-41839,0,0,7c22c7560745c0193919f9882c2fff0f3a5a0bd9a40ff759ac0ae75da9136afe,2025-05-28T04:15:31.777000
|
||||
CVE-2023-4184,0,0,60df463ab72975bdd1bf87dea9d6116251117803b12f9222b99bf19e9331ed2f,2024-11-21T08:34:34.303000
|
||||
CVE-2023-41840,0,0,8d20f8abe065bcbe2c2d718ad7ceafc29f0c9c2f78c1e082d11032e68d2148f8,2024-11-21T08:21:46.637000
|
||||
CVE-2023-41841,0,0,491f8782f84ae4bdd0c119a57acc5dfb8b3c40fff6f6761c378b72c883787aec,2024-11-21T08:21:46.777000
|
||||
@ -246093,7 +246094,7 @@ CVE-2024-11181,0,0,a6b77044e6509fe3aca0bf2fdf8735020e45d95ff8f1e77d85c770a6e50da
|
||||
CVE-2024-11182,0,0,fcbf84d76bd0ec5a6be96e0f2f3367a28021db9502432aff67df27ded6f18f2e,2025-05-21T18:44:12.623000
|
||||
CVE-2024-11183,0,0,38a79fdf028e6d076b0c9ce59b96b7c75f295dd059f7e0b8602ad289d643763d,2025-05-06T21:25:00.510000
|
||||
CVE-2024-11184,0,0,95b60c199ec8feaed7403cfeaeb615c0adf5827564743c751fc62910137c62e9,2025-01-06T21:15:13.693000
|
||||
CVE-2024-11185,1,1,c6a17314ee52960d01f698ab8cdbbaad5a9c6a5fb6b7f626a2200ccec27553af,2025-05-27T23:15:20.580000
|
||||
CVE-2024-11185,0,0,c6a17314ee52960d01f698ab8cdbbaad5a9c6a5fb6b7f626a2200ccec27553af,2025-05-27T23:15:20.580000
|
||||
CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000
|
||||
CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000
|
||||
CVE-2024-11188,0,0,8070c22ab1552d28f4790f36fbb035b9ddec6883502131d83e84861dfa7e75e7,2024-11-23T06:15:17.570000
|
||||
@ -262550,7 +262551,7 @@ CVE-2024-36681,0,0,96c1846f583101f7866c8fadfdf3a33b81ffcf4e96d0387c413dba15329c6
|
||||
CVE-2024-36682,0,0,cb2995f0242062cfca7bdf65500013048768a2b6d65b1c25e30172054d0e0139,2024-11-21T09:22:32.397000
|
||||
CVE-2024-36683,0,0,be595454ef8171db03a002d73c28446849c4fd224f6bc90a988dfe37de330fdc,2024-11-21T09:22:32.600000
|
||||
CVE-2024-36684,0,0,8fab043b3364ae1eeedff575a1f0cbfbc03fa998f9cc28dd8bada425bf4a8acf,2024-11-21T09:22:32.807000
|
||||
CVE-2024-3669,0,0,48e93d834169209b4a3103f1fa3909fb6e7a831db81a3ba76b06d37b3e787c9a,2024-11-21T09:30:08.690000
|
||||
CVE-2024-3669,0,0,bf0d428440354671ae9f717d945ef28e9e393ce50c7ad5fdcc16412f8b06faf2,2025-05-28T00:54:09.360000
|
||||
CVE-2024-36691,0,0,3dfc8ca2b0f56703968ad393c59292478596f8672b0393464c33aed3c63780aa,2024-11-21T09:22:33.040000
|
||||
CVE-2024-36694,0,0,97e39bbb6c67fa2d3fcd0bc2d169d009680f66af761bc61f98a7f5a4b2e194ab,2025-04-22T15:36:02.527000
|
||||
CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000
|
||||
@ -265857,7 +265858,7 @@ CVE-2024-40956,0,0,f35dc66c569773537c41655b5b868e59e721e8f7ff6809d21084628e699c0
|
||||
CVE-2024-40957,0,0,8c88dfffe800e3d85344951840f64f97a55eebeb79655fdcb09982a38c3f76d5,2024-11-21T09:31:56.810000
|
||||
CVE-2024-40958,0,0,7495d58e5b81955176212788f60f87330a2e9c6bce5c3dd26de405b05b1f6533,2024-11-21T09:31:56.947000
|
||||
CVE-2024-40959,0,0,0043be57531474631cc6de7737512d2ab0230deb9269189d29b950369a0fd17c,2024-11-21T09:31:57.090000
|
||||
CVE-2024-4096,0,0,8de4935f6098b6eef1effebea5690d7854065723072ff76e21cbe24e62d668df,2024-11-21T09:42:11.190000
|
||||
CVE-2024-4096,0,0,a6100502a92d8a5a161d019b647bc5dcd282882af1f3f803f74e649aaeea854a,2025-05-28T00:52:03.347000
|
||||
CVE-2024-40960,0,0,d1b260bce7a6f4e3918591cefa3fd644d2061253ecfc0dec1722a192d1703af2,2024-11-21T09:31:57.263000
|
||||
CVE-2024-40961,0,0,c323f131dac03e8f3736a795ce92c772336b6ee895d5ed1507aa424851c01204,2024-11-21T09:31:57.413000
|
||||
CVE-2024-40962,0,0,1b32e5be99ff36031e51ef4af62c32f3376ebee25aa8774ef70b4bd4ef137e55,2025-01-07T16:10:10.253000
|
||||
@ -269051,7 +269052,7 @@ CVE-2024-45088,0,0,1beec48fbebe975f8bc73123f865d04a7ed8df665a2d4af27f0cdfaad4366
|
||||
CVE-2024-45089,0,0,542dfbf973be63b03ff718a4f3a8fab91d5b396d4bcab48b662c4f8c45834b4d,2025-03-05T18:26:20.030000
|
||||
CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000
|
||||
CVE-2024-45091,0,0,15b0a69c48e3ad122ef5c06eab93e452421cc3bec77edca18bcd67201ac2adaa,2025-01-29T21:12:41.107000
|
||||
CVE-2024-45094,1,1,eac2452d1432b4c60a27953b2742ccdca4fbe302b18c5bcd9565d7950844128a,2025-05-27T23:15:21.093000
|
||||
CVE-2024-45094,0,0,eac2452d1432b4c60a27953b2742ccdca4fbe302b18c5bcd9565d7950844128a,2025-05-27T23:15:21.093000
|
||||
CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000
|
||||
CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eeaa37,2024-09-06T12:51:59.750000
|
||||
CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000
|
||||
@ -271610,7 +271611,7 @@ CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7
|
||||
CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000
|
||||
CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000
|
||||
CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000
|
||||
CVE-2024-48702,0,0,307b904a666af6813868acd076c344b88453ac52a59c26a56b076304996e11e6,2025-05-23T15:54:42.643000
|
||||
CVE-2024-48702,0,0,01ea8d7d8d70b95471496eea8001e6b5bc98a75e9594313b9cf5383c4cf9d75b,2025-05-28T01:40:19.143000
|
||||
CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000
|
||||
CVE-2024-48704,0,0,3893d860c5cbcfcb221edb7b511c8425d1a2b0fa61906308ba9350b2db11e150,2025-05-23T16:15:24.403000
|
||||
CVE-2024-48706,0,0,c943b13c3a3939cb5d8b86b065bc2ddde43d7d1c2b6d276f98ff2b2d6bbb9294,2025-03-25T17:16:11.580000
|
||||
@ -273566,12 +273567,12 @@ CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c
|
||||
CVE-2024-51094,0,0,428eba4d2b25aa4f0722ef2b3d4daef54792a17342b2b8a3a1bd37dc73e6ba77,2025-05-22T17:28:00.107000
|
||||
CVE-2024-51099,0,0,76299d701a4a326304643950fc6a06063189d1cf898039e5e4a1de0b1cac5f1f,2025-05-23T16:15:24.527000
|
||||
CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000
|
||||
CVE-2024-51101,0,0,fec8dd28bebab4662ba2a4d707a6d12c68a1d678f538f5ab886249855c7a1999,2025-05-23T15:54:42.643000
|
||||
CVE-2024-51101,0,0,e4d47c0080321b806c8f657e0373e6db1fc5c5309326af02b3039c69f02cb6f9,2025-05-28T01:42:23.560000
|
||||
CVE-2024-51102,0,0,97831955bfdf9790880422aa6ef84b830a8bb4e25861ffcd032c1ac1a29b89ef,2025-05-23T19:15:21.220000
|
||||
CVE-2024-51103,0,0,f4b83b954d67fa14dd00f188cb7911f528eb31c3009429b0a9d4991a04725b3d,2025-05-23T16:15:24.643000
|
||||
CVE-2024-51106,0,0,b4f066c6258fb1ca79f53921624ad8ee81faf462bcf70c6ebe65131d490bc5b7,2025-05-21T20:25:33.823000
|
||||
CVE-2024-51107,0,0,d688abae21c988868a73bc1ff17121c383b72a833d19b71da23855711720f40e,2025-05-23T15:54:42.643000
|
||||
CVE-2024-51108,0,0,40947e231ab684dad8551f526deae7e614b95f3363b2d658df8b035009d3076b,2025-05-23T15:54:42.643000
|
||||
CVE-2024-51106,0,0,52316175fd89c5253300b2e14d9e26b21a88903277d9d4c00394f347fe89ca33,2025-05-28T01:00:45.410000
|
||||
CVE-2024-51107,0,0,cbf01b3eee34c7b5a0cd560312505110cfa6f6be423a19b9a60a07d3542da8c4,2025-05-28T01:44:54.320000
|
||||
CVE-2024-51108,0,0,70e9fc6e5f619b67ea5feb94e2f056d89d4c926a188193efb96358eb6c910327,2025-05-28T01:44:07.960000
|
||||
CVE-2024-5111,0,0,afdc374c63208154122a1e480b379bf8aece87015a21eb603ff3e335d14b6fef,2025-02-21T20:09:47.700000
|
||||
CVE-2024-51111,0,0,1b60f534839740b969e5474b088b0887cce9ab6321e3570e84fbd1d3290a378d,2025-01-06T18:15:20.060000
|
||||
CVE-2024-51112,0,0,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000
|
||||
@ -277806,7 +277807,7 @@ CVE-2024-57646,0,0,a888cdd5365c2b8dea460aeb56378a7623ae682bc07a8d0f9dec38273c362
|
||||
CVE-2024-57647,0,0,d3984558393252e3df3fb667ed5c80aa1b991a2d6bc9d98908f75cf9cd4397fa,2025-04-17T16:47:19.220000
|
||||
CVE-2024-57648,0,0,b7c7dc7ebc32322874d38b1745b034b539148709438f93be252e21212efcaa79,2025-04-17T16:47:16.813000
|
||||
CVE-2024-57649,0,0,a90ba56c8166c25edf0ef2f87243dc95641782e6dd10bd8cd0ce7bb7dd78c660,2025-04-17T16:47:14.280000
|
||||
CVE-2024-5765,0,0,8bc2294d6d7af965be603f90c65d8cabf573a7f7fa01fb8de5ef7a7fb2539707,2024-11-21T09:48:18.090000
|
||||
CVE-2024-5765,0,0,92c5d8c017efa62598245e2a40eb941bba381c9d8565f04d08f00539e71e0cb2,2025-05-28T00:51:15.270000
|
||||
CVE-2024-57650,0,0,d5ed05d0d2ef6d6244f24ea302a427ad0877aa33635ccb941889bd4ce3686559,2025-04-17T16:47:11.903000
|
||||
CVE-2024-57651,0,0,62b1065be744d99f48fea1a3e7658cb0a92f791d0c8c9d29d94c4ab0ff0cc35a,2025-04-17T16:47:08.997000
|
||||
CVE-2024-57652,0,0,8f20d5782dd9506a7196df3ec7850b57fabff337caf79c5adae6fcd0cd231a9e,2025-04-17T16:47:05.030000
|
||||
@ -278127,7 +278128,7 @@ CVE-2024-58066,0,0,c6e3b768d006a4e502266d5440a1292003cf4ce5373a8e00bedbdf635b758
|
||||
CVE-2024-58067,0,0,539fcaa5844135d8382de5294a58afb3d718ddb2522286dde14d2eb07f695970,2025-03-25T14:44:00.237000
|
||||
CVE-2024-58068,0,0,c4222890e8d1bb8a6fd55e01d09dd9d69c7567be1d440d26b5a5d79630a65f7d,2025-03-25T14:47:07.467000
|
||||
CVE-2024-58069,0,0,e74d8cad603e1620e828d4b3caac6e0ceb942144c73e5c456889b854714ef962,2025-03-25T14:48:40.760000
|
||||
CVE-2024-5807,0,0,e39b8ad5e228368927b79aa56a54eaa43f3eaa14a89129cbf854c403a97f91d8,2024-11-21T09:48:22.057000
|
||||
CVE-2024-5807,0,0,d4be4262d40bde5347e31b02a8283ace048206bfcacb514bc578a69101017b51,2025-05-28T00:50:36.617000
|
||||
CVE-2024-58070,0,0,9c89d9904014e5d004d59e1f69fe53f6a2ec8e42ab0e66d5da1feebbb233b551,2025-03-25T14:21:57.697000
|
||||
CVE-2024-58071,0,0,aab391a33ed2ebaff184b9ec4086049e627ecb3ac5f43dfc6d2aa871d74b66dc,2025-03-25T14:22:11.633000
|
||||
CVE-2024-58072,0,0,d52e0da3f5c91d03028994ae6c07bb11e0728d624ff7bdc5d9ccc3a65443e2c9,2025-03-13T13:15:45.920000
|
||||
@ -278138,7 +278139,7 @@ CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a1
|
||||
CVE-2024-58077,0,0,f3ec17f492afe830e4bdffec9ee6935e46e28e5e78af48de044da0a78231897b,2025-03-06T17:15:21.123000
|
||||
CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000
|
||||
CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000
|
||||
CVE-2024-5808,0,0,5a73a5618425d1f2d9eaf1f173cdff3fa455743e0b010bcc63eccd6f6e0c1652,2024-11-21T09:48:22.213000
|
||||
CVE-2024-5808,0,0,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000
|
||||
CVE-2024-58080,0,0,e3835bb895176f76b9629f1f45e7a50098fa6dc90a8d8933f702379f8bdec271,2025-03-25T14:27:18.737000
|
||||
CVE-2024-58081,0,0,d14fd97d756a1cf5956e0eb5be64ade4f19b40adbeb5fcfa6440435351f38eb0,2025-03-25T14:27:38.820000
|
||||
CVE-2024-58082,0,0,2224c338aeba3c6f1f3d7b825286f63e7ba1be753f0574b81f01302121977acc,2025-03-06T17:15:21.677000
|
||||
@ -278149,7 +278150,7 @@ CVE-2024-58086,0,0,f1395b9bc6450b1446434126a0cdece082421cfdb9c768edd21ee2aefff1d
|
||||
CVE-2024-58087,0,0,04a36bf48b3a2cdfea7da85ab1709b6a14fc57278f19e47877c4e4a8b19d5d33,2025-03-13T16:22:01.067000
|
||||
CVE-2024-58088,0,0,548028057d678538b0d3a9c3c915640aea1986564c6a81f45d90000c55bd6831,2025-03-13T16:21:33.877000
|
||||
CVE-2024-58089,0,0,c539e21863bf6d808e8f03e17c4063f4cf474cdca947eadd829ab37d0ca02025,2025-03-13T16:21:17.030000
|
||||
CVE-2024-5809,0,0,0a5bf6a9d99e27af5b5a00b47f9d494997d7ec310ddf537ead1dec78e82e93bd,2024-11-21T09:48:22.387000
|
||||
CVE-2024-5809,0,0,c4b8b59104f068ec24124c9d818f6d627fb564dbf53494b008a39765c54f9477,2025-05-28T00:46:20.463000
|
||||
CVE-2024-58090,0,0,5d5a772ef85a7d7cf1764ffd3f4d817a84bbc6475cefed9abaaa898b75cace7a,2025-03-27T16:45:12.210000
|
||||
CVE-2024-58091,0,0,bdb73265ec2113004990c5b046492ea3ca27cffddbcbc776a99f7489adfd4d1b,2025-03-27T16:45:12.210000
|
||||
CVE-2024-58092,0,0,53f31227bd07354c6c789ed76152b430dbc15e4ab3c96f0045d950ec318a2250,2025-04-16T13:25:37.340000
|
||||
@ -278354,7 +278355,7 @@ CVE-2024-5971,0,0,f03f53869694442f097b92cf60ccdd932b1bd24804d85a21f37d5d1a934565
|
||||
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
|
||||
CVE-2024-5973,0,0,5764fe7dba8a714456e598c82d1ba942598616db44809839e67ac1f6bf90f970,2024-11-21T09:48:40.297000
|
||||
CVE-2024-5974,0,0,d125bc9130d6cdb44d098f1dba162d025003a48ce6f65b23901cdc8d897e2e84,2025-01-13T18:15:19.697000
|
||||
CVE-2024-5975,0,0,1540d9cf16be3cdaab49810d2c22343710e6ed2f67972005f1fcea70f1fac8ea,2024-11-21T09:48:40.623000
|
||||
CVE-2024-5975,0,0,3be3b53e1dab5331d0640ddf4a1f3b483a49f7699ffb58531a66efe441ae4f11,2025-05-28T00:42:32.570000
|
||||
CVE-2024-5976,0,0,87c7e0aaf6cd0dcd3015a44e98f6c6317c749221800441ee90e6991faaa5d21d,2024-11-21T09:48:40.793000
|
||||
CVE-2024-5977,0,0,909876bcbf4f2ad2839dc39ff9f402926337af028be37025b6a8c86d94af7f35,2024-11-21T09:48:40.960000
|
||||
CVE-2024-5979,0,0,af718dd6f9c3a56a817df80eecdb8156b18063e36e493393439a223ddf585359,2024-11-21T09:48:41.093000
|
||||
@ -287568,6 +287569,9 @@ CVE-2025-25014,0,0,647104a2327be5f1c7c985c2226368a66da33abeea590fea277f963925352
|
||||
CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000
|
||||
CVE-2025-25016,0,0,d83ceddcf1bcf084cd4544ad95cf9a19b953e3c151e0441bc0e4520196c8ad1f,2025-05-02T13:53:20.943000
|
||||
CVE-2025-25023,0,0,074c065f09189eb031ac585458a2e1d09aaf15c120a072909abd4feb5fd42f37,2025-04-09T20:02:41.860000
|
||||
CVE-2025-25025,0,0,51175f6f6820fc5f851da04a28029425565c96ca40249a30897b9927e1fa4df9,2025-05-28T02:15:20.417000
|
||||
CVE-2025-25026,0,0,913a89931cf7d794e2984ce9c9070908f3ccbf7de7cf875dcc9a0cac87fa616c,2025-05-28T02:15:20.583000
|
||||
CVE-2025-25029,0,0,070306c6d189398d41fa68d33581165f5e9fc679fe550088a4029ab8b935844e,2025-05-28T02:15:20.753000
|
||||
CVE-2025-25035,0,0,4a2d0f672ce0e83b98c92e972e5b7eb6fa5e15f13c5c1cb0d71f8aaf6e12e24b,2025-03-21T19:15:45.437000
|
||||
CVE-2025-25036,0,0,a8799abf886f32cf74fa3727668b9ee2d7cf5c4f840bf1724d07c64c2d8a39a5,2025-03-21T20:15:15.293000
|
||||
CVE-2025-25039,0,0,6155e71068b69a4630ff4049b1126cd719aacb06ed44ea56a73c6de4d42c8922,2025-03-28T17:37:36.690000
|
||||
@ -289357,7 +289361,7 @@ CVE-2025-27937,0,0,46e59abc87395fad933022253638fee740418314c08fa44c43852bb835ed4
|
||||
CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000
|
||||
CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000
|
||||
CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000
|
||||
CVE-2025-2796,1,1,0fbb630e2abe61aade417421e28e8d980bbaee928d1afe4ed72e70bd3970f2ae,2025-05-27T23:15:21.283000
|
||||
CVE-2025-2796,0,0,0fbb630e2abe61aade417421e28e8d980bbaee928d1afe4ed72e70bd3970f2ae,2025-05-27T23:15:21.283000
|
||||
CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000
|
||||
CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000
|
||||
CVE-2025-27980,0,0,d2f5f5ebada616a2bc11216168eecc9bced7938b2c036a22eb2533c1949980c8,2025-05-22T15:53:24.823000
|
||||
@ -289470,7 +289474,7 @@ CVE-2025-2825,0,0,e4db2ec87b94dcda703a7cb29d9641a787a1d84d05d6f964d3ea9c8b54dfc7
|
||||
CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000
|
||||
CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18
|
||||
CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
|
||||
CVE-2025-2826,1,1,cde927b828c92118110a503a691e114965c68db4bf88b439a0626463e4906f70,2025-05-27T23:15:21.400000
|
||||
CVE-2025-2826,0,0,cde927b828c92118110a503a691e114965c68db4bf88b439a0626463e4906f70,2025-05-27T23:15:21.400000
|
||||
CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2830,0,0,18f5acbcc1908730340a8cc830c427c3344653036d2c90e6b125301c8343cff5,2025-04-15T19:16:07.927000
|
||||
CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000
|
||||
@ -291905,7 +291909,7 @@ CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7
|
||||
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
|
||||
CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000
|
||||
CVE-2025-3244,0,0,83385a875e2316aa8147e21cd040f4a5fd2ca8ba35219f944564cb0a256174d9,2025-05-14T21:07:17.220000
|
||||
CVE-2025-32440,1,1,7687ef0eb2c76bab0ab5f35300721a80b41ea3da13903bdea0b6cb12719c2349,2025-05-27T22:15:21.980000
|
||||
CVE-2025-32440,0,0,7687ef0eb2c76bab0ab5f35300721a80b41ea3da13903bdea0b6cb12719c2349,2025-05-27T22:15:21.980000
|
||||
CVE-2025-32441,0,0,5d96695d99df210c451cb1297434489aa5ccf2a218059c2922743ca7b2a18209,2025-05-08T14:39:09.683000
|
||||
CVE-2025-32442,0,0,3d727ddd988064a7ed8b991fa369d7c4d417f02766d256143d6103e1f774327c,2025-04-28T18:15:48.393000
|
||||
CVE-2025-32444,0,0,040bc0b93f2555e371bd992e022bc009bca8f15a87bedbd2890deefa7d9aa25f,2025-05-02T13:53:40.163000
|
||||
@ -292737,11 +292741,11 @@ CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493
|
||||
CVE-2025-37087,0,0,20c409449e046fc0b07333a7d65b24c67907255590b88923cb6e09a524d20ee6,2025-05-01T22:15:17.647000
|
||||
CVE-2025-37088,0,0,64ae2a894e2b0014068f1cc908ac2a8b164865977a9c111fb0dac895c15630cc,2025-04-25T15:15:36.593000
|
||||
CVE-2025-3709,0,0,bd15d31f777243540548b544e8985e8a31e62890f7bf4ae13fef85062e09984a,2025-05-07T16:50:52.680000
|
||||
CVE-2025-3710,0,0,5aa43f5fabdf7e9817af1de08a2142fd174a57fb507ed647c50bf588c3363b85,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3711,0,0,2b1f73f7c25e1131be9414f8abf0310a7225e0ede93e6016e7f8382780f6561d,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3712,0,0,dd9b463afaad18845257a3f3c051550600b24c3aea0efff51395845ccca7350c,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3713,0,0,154751ac02fbaf3aaf50af34492bc06e71aef0193ddb6a46a03e4d32dbca6a36,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3714,0,0,98a93e61a4a0bb6f50be73e9742e35c249ec9199635d808c3a34b4b6ca53a4ed,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000
|
||||
CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000
|
||||
CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000
|
||||
CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000
|
||||
CVE-2025-3714,0,0,3fcd28d3a7b81c31d305f49be6e84a00b4570b4ee1caa0904bee1851b94e6d66,2025-05-28T04:15:45.850000
|
||||
CVE-2025-3715,0,0,2d1d9dba7f9eff4431b265f83f4af3c259cac9ce8ddae0a96ec092e646ca8d2a,2025-05-19T13:35:20.460000
|
||||
CVE-2025-3723,0,0,477418a320dfd53a6e935f7e337452b515033da0e585c9ca76a1582be0b01b2c,2025-05-12T20:40:10.330000
|
||||
CVE-2025-3724,0,0,18e69c1094bab55d0abc5efd07a77f5bb56c4db0cf848fa0037b08e463c287e2,2025-05-12T20:40:24.853000
|
||||
@ -293477,6 +293481,7 @@ CVE-2025-4005,0,0,3395f342452d81fe28f72171670472e990a8955faacab9ea9a30fcbc3d4e23
|
||||
CVE-2025-4006,0,0,b4863f9bca9c45c782eac4e0a8df6c153136ca75006dde5bfd67dbac13da0ed2,2025-04-29T13:52:10.697000
|
||||
CVE-2025-4007,0,0,9777df4491741671ed8bb32daaef6bd13e88a3bc80a38f81c67c7e3aae15aace,2025-04-29T13:52:10.697000
|
||||
CVE-2025-4008,0,0,f0130f878a53471d3fb1549dc09ccb4cbdfcbe18d257d761f05f6b646d258a62,2025-05-23T08:15:18.633000
|
||||
CVE-2025-4009,1,1,a48f90cd6b7bf84b4f335a72c36b7bc833d628e392db355b6779faa98ed5af8b,2025-05-28T07:15:24.490000
|
||||
CVE-2025-4011,0,0,3819550e074b2f97f25ec51252193290e9c87c0a28a7aedb206338328c0e7b76,2025-04-29T13:52:10.697000
|
||||
CVE-2025-40114,0,0,18b151536edb74ce6ae0abb057cdaf2f657d28b31cc048efaafef211823a9957,2025-04-29T13:46:29.167000
|
||||
CVE-2025-4012,0,0,36dc3f78b0e7e3ac1f05487215ef307e4a3550924eb6d25961b0b1557c98be91,2025-05-12T19:30:30.873000
|
||||
@ -293603,7 +293608,7 @@ CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b
|
||||
CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000
|
||||
CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000
|
||||
CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000
|
||||
CVE-2025-40911,1,1,5d617aa4f3c4bdbc7ab0031b95d2c6f4ae3adc9c4e4ba8d678d8f4330717f313,2025-05-27T22:15:22.337000
|
||||
CVE-2025-40911,0,0,5d617aa4f3c4bdbc7ab0031b95d2c6f4ae3adc9c4e4ba8d678d8f4330717f313,2025-05-27T22:15:22.337000
|
||||
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
|
||||
CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000
|
||||
CVE-2025-4094,0,0,c4366c891a9ac824ae6e9d82e5a7df040ca58b43955f28a6e84c485206c2a693,2025-05-21T23:15:54.973000
|
||||
@ -295160,6 +295165,7 @@ CVE-2025-47947,0,0,937e21e816ace6c7b2eea9b27977c70a0355dffa802eeb709a1580aec3fe9
|
||||
CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefadd52,2025-05-19T15:15:25.400000
|
||||
CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4800,1,1,effbb959592fe4d51aa2f33071036fb2b9c5d78070f2c0d5ec37a9c50fcffec6,2025-05-28T06:15:22
|
||||
CVE-2025-48009,0,0,f2f593603a23342f1ed10e6e06b800747a948e9a47401b873fcb7b9febb49dba,2025-05-21T20:24:58.133000
|
||||
CVE-2025-48010,0,0,29ecfb7056487f862ce3f3d52a72af1a1c7498499e974227523a3feeadf25999,2025-05-21T20:24:58.133000
|
||||
CVE-2025-48011,0,0,f7a7d415ad80812a779b1090cc64c6da9309fa4d9b5980d621fc83dfabfec97d,2025-05-21T20:24:58.133000
|
||||
@ -295220,11 +295226,11 @@ CVE-2025-4814,0,0,701ab03b7a876ef5bc2e1ad888c3ec9b57b3290dbffe826cdd00c807fcd57d
|
||||
CVE-2025-48144,0,0,d64923e40fdc0e7e404ab923fc3419b37f7c428f4d5f5c57ca1b8c036d0841cc,2025-05-19T13:35:20.460000
|
||||
CVE-2025-48146,0,0,ab7aa4605de119e1b098c976e2765794696963be887a36cad3a72cd3dfef653e,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4815,0,0,d56932e9d68c28e8c84ba9340c5fe206f8693cbef9a54e1900a1c0e6a352f201,2025-05-19T16:15:33.753000
|
||||
CVE-2025-4816,0,0,f14c1cfb83c8c6ed9a0698dfcc95775ad36a530b7fdf1e45228f3250bfb98f58,2025-05-19T16:15:33.863000
|
||||
CVE-2025-4817,0,0,dd10739a15af78c4705e3e00a519aed353f304d46b521ddf484b8fc0fc2938a8,2025-05-19T16:15:33.977000
|
||||
CVE-2025-4816,0,0,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000
|
||||
CVE-2025-4817,0,0,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000
|
||||
CVE-2025-48174,0,0,f26469907442315e96b5feb9308b03c4506fc8074c00574b934b171f795f26df,2025-05-16T14:42:18.700000
|
||||
CVE-2025-48175,0,0,3f6bab737596fdb5634db37c0296a1b165ba48ea379824d01c7b1ce82612cf5b,2025-05-16T14:42:18.700000
|
||||
CVE-2025-4818,0,0,65473837bd1909e5e7f653a7d28de0873bcc16d5c4c178e6d14886f055e06866,2025-05-19T16:15:34.087000
|
||||
CVE-2025-4818,0,0,46d731a7fb69ff2dcbbabe2b3a403a7f0fce04438dcb8f5cef1cb1fefa0dfdd7,2025-05-28T00:58:53.250000
|
||||
CVE-2025-48187,0,0,be9d0afeae04913d345ed4d335591274c105e6700369ecf88b41657ac12d62eb,2025-05-19T16:15:30.853000
|
||||
CVE-2025-48188,0,0,9338f093747813e06d902a44455aea29fdf3a611a5e401cd7c2e67e28da8d86c,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4819,0,0,49caec14472d9713a5e005512e05ab68ec95bbd6e0ab80b85d595ebe6722e2cc,2025-05-19T13:35:20.460000
|
||||
@ -295408,6 +295414,14 @@ CVE-2025-48827,0,0,a50f840283fd2bbc9a0c236b8e0a7afc67476d4ec5792331b9e1240a1d96c
|
||||
CVE-2025-48828,0,0,7babaccf1c826448de50840a4963541ace772dfd59a97c487664d8dadaec9e30,2025-05-27T18:15:31.513000
|
||||
CVE-2025-4883,0,0,5862fdd520821c1eedf697774db7196e34040fbccfc13f239bec6cec686b2e42,2025-05-21T19:38:13.727000
|
||||
CVE-2025-4884,0,0,2d6b345f6687876df2d3e4cb744a5caa526ce300870cd564926a11af2bccc222,2025-05-19T13:35:20.460000
|
||||
CVE-2025-48841,0,0,7f0e0c969efb3bef9720951c083cd77dcf55000205a06e477705e2d5154973aa,2025-05-28T04:15:46.770000
|
||||
CVE-2025-48842,0,0,ba4bb2008ab25dba5eb316ee71e55945ac6c6e86998ead36e4c18bbc602b9af6,2025-05-28T04:15:47.390000
|
||||
CVE-2025-48843,0,0,289fb4ccd51aa9f39fc7cb046c750bb2c9f1a40b8367b3b0a2c79fa22f4210f1,2025-05-28T04:15:49.640000
|
||||
CVE-2025-48844,0,0,691afc4818b837f5124b1a7a449458230f6243d5fbc198f10ae02e1957b945fa,2025-05-28T04:15:49.917000
|
||||
CVE-2025-48845,0,0,28c2c377a50b04054cbacd4d8a00509c2a1ec14792776b092a7a173a471a81fb,2025-05-28T04:15:49.990000
|
||||
CVE-2025-48846,0,0,b4331e28b4548a0a81d0232dc77a343853591cec3e2f531b56c1d53501bb623a,2025-05-28T04:15:50.067000
|
||||
CVE-2025-48847,0,0,b8563d91ba0679f627536816b3f17216a89f937d1a7db8c25b786323bd30235b,2025-05-28T04:15:50.140000
|
||||
CVE-2025-48848,0,0,38731265ae915b14c5e915b02c11b0e53a54815641117da26fffd1c6f20ec7db,2025-05-28T04:15:50.207000
|
||||
CVE-2025-4885,0,0,71690adb8bb16dc3b0abf632ff77fd8611dc09917588754b8c57e67fe3a44bd2,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4886,0,0,f0bc96dcd8776bcc92f543590bbb95ec4351295de136202b130c74e915ed1af1,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4887,0,0,a7b499ed3cdf6c879f3ec3b69793ad811740da88bfec778065c6ba52abd3d64a,2025-05-19T13:35:20.460000
|
||||
@ -295460,11 +295474,12 @@ CVE-2025-4934,0,0,223d290223d766bd8fadc58a50b1e245df2a17d05c7a82ae8c467c7317c633
|
||||
CVE-2025-4935,0,0,0924c431ea344338f09c6746a2eb896f1051ac5651ba0c066119ecf4a65489d5,2025-05-21T20:25:33.823000
|
||||
CVE-2025-4936,0,0,52f00703e856a8895a4ad73331c7e04059651f0c33578ef1dfde1a53c8bf17d2,2025-05-21T20:25:33.823000
|
||||
CVE-2025-4937,0,0,04c10f6938329dfd4cb4a045dea1d120d3485da87d3dc89f52a5fd817e2ecd60,2025-05-21T20:25:33.823000
|
||||
CVE-2025-4938,0,0,869000ce212a95a4f151806c116520d3892cf0d02e418337c2a222fe633e7492,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4939,0,0,900a9898cac9c0072a6851a87a1fc394fc59a43f240149c960c6ba983fe7fa0a,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4938,0,0,9bfbb8aefdfbb754eacbb83a30a05c557a118de2c85e31be873a9e69bcb3eeca,2025-05-28T01:33:36.677000
|
||||
CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000
|
||||
CVE-2025-4940,0,0,2476264f5ca230e398816216f503ad21bd6ee0718fc81a3cc8e1ef1268a9a775,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4941,0,0,82d771500a33f9b956507ffd28047b96677ad4beb2427845b21268f137b2c892,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4941,0,0,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000
|
||||
CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4947,1,1,41b4309526023f35da5d8a9cbf74ea981242bfda1f99d26c1c00c59137d84ac7,2025-05-28T07:15:24.780000
|
||||
CVE-2025-4948,0,0,dbe30938d8190315dbaa2e8d5919e8362721c3330df496b34aaab2abe9515761,2025-05-26T12:15:23.963000
|
||||
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
|
||||
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
|
||||
@ -295481,17 +295496,18 @@ CVE-2025-4998,0,0,a06730a0691f90a016a49869bfa33e7c322397c4e2518cd0a37207b1507563
|
||||
CVE-2025-4999,0,0,13735415b149480bfb9de9a45e935c4947f4c7ec7df58eed18894635f565eb11,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5000,0,0,b88fb5c3c6d713007bd8f08b5b98b94c4b65f452e1cfcae4950b23010aca8b7a,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5001,0,0,31ad5c5ea8790484d4eb2202eb4a0629e0128642e382cfb8927c9b9893b4fc3b,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5002,0,0,aa550d09179c9601bc82e597278e3339b109c2d213b463d7ead2b28dedc0c87f,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5003,0,0,9a44f46b154e04fe5f03f8443daf3417b6856b5aba0b0c5c35c060291d7e4b67,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5004,0,0,98a1e99d8b9fad0ef327b4c81df373b549ef5dd0fa093c7d9c1f1be9f199e7b0,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5006,0,0,729926df09abb067b82af766b59c94064c0f4dede57c63b42c7f94d4794cc929,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5002,0,0,971f36c284dfb1e294c2db4acf298a0f7591c6e0e260cfb633ad289f7903a4d3,2025-05-28T01:25:25.310000
|
||||
CVE-2025-5003,0,0,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000
|
||||
CVE-2025-5004,0,0,d7fd9b6c8114c9ac860c14fa88897684c73b2b8251dca41c12cda3a8ce9d421c,2025-05-28T01:20:50.517000
|
||||
CVE-2025-5006,0,0,681cabb0d000288ea3de1bc96c248c8dc62af67d94cda924b490a24cb5ce4b87,2025-05-28T01:16:17.537000
|
||||
CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5008,0,0,895e1964dc0670383faa4bfe12d1cb725d77ab879d8cc70a1871495cd50c3e48,2025-05-21T23:15:55.200000
|
||||
CVE-2025-5008,0,0,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d57,2025-05-28T01:06:49.867000
|
||||
CVE-2025-5010,0,0,93497e2b48b334d59fac1bb8ca9073e5f336f986ef89ce0b89f9db876e65e870,2025-05-21T23:15:55.330000
|
||||
CVE-2025-5011,0,0,d1caeeaa784d143902e41e16fc8809733bc411c4665df188f33764965bcab2ec,2025-05-21T23:15:55.447000
|
||||
CVE-2025-5013,0,0,9e2206cee3d9a4da13b7d790d61a24286d0c704fc74b7b095d3cf27be2eea613,2025-05-21T23:15:55.563000
|
||||
CVE-2025-5020,0,0,8e92e81268cb02470f5321fbe111bd1217491079f6b87fc538686f0917f7768a,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5025,1,1,7453e6923eb1a45f61a94bcc35c54f4d6c6e3d7ea83c8b1a686b8ff6ef78a86a,2025-05-28T07:15:24.910000
|
||||
CVE-2025-5029,0,0,ecb9afcd5e588564920b0ea2535593ae37c1896d06cac3ff8323350bc3b94721,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5030,0,0,524bdc59d3cf3de128931a2064721f0c18eb0893fa1e7a140dbc00738f726523,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000
|
||||
@ -295503,10 +295519,10 @@ CVE-2025-5051,0,0,9c110d30fb7d5b76a834a2709876396dbb061a47276883a9c8b6f8ca7926c4
|
||||
CVE-2025-5052,0,0,aa387e74996184bbceb7dcb0f0533b96402b1f03de23f558fcebbd4c6085f924,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5053,0,0,d1f3d03feac0d168cc0b9fceb4dacff5c6f1aabc5f310733ca2bf60999576839,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5055,0,0,d4a91ae5f00ddb3d7d93c133377af96d82720d9fe60fd3aa075ce0c3c6bb5ff8,2025-05-24T03:15:24.523000
|
||||
CVE-2025-5056,0,0,5d828001fcf3a0c7199423756892ef7203d79c93ef8f9b9ff6a40503329589d2,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5057,0,0,9ab19a2c6361cda5644cf55ac09c66d34ed104e148938809e5ea8cd6c9f9297f,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5056,0,0,41abcc4b21c4c44af1bb2b5ebe6eed640fd93ff380221b407c4bb670519af696,2025-05-28T02:08:30.840000
|
||||
CVE-2025-5057,0,0,c177a6255394eb47f572d99869089826f5992edac771e2e307615417afe5454f,2025-05-28T02:04:36.163000
|
||||
CVE-2025-5058,0,0,33bbc180837c7bff4c1df8f50429e7ffffb5678857a47e56a7d4d34987379b2f,2025-05-24T04:15:32.560000
|
||||
CVE-2025-5059,0,0,05a7e8fd4cdbbb0bda914599a983f96db3a6a250cd413b41e5799b0229b6e3b4,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5059,0,0,f8f742257ec34ff8db6f494385cd1222a7c04c23d48b685959ae7dfe1442b4eb,2025-05-28T02:02:49.230000
|
||||
CVE-2025-5062,0,0,bb09b5c3154dbeb834d9f154b075fadf5acce7938c0b0ea58fb15d93688394c5,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5063,0,0,22ca900734388c6e87a6f1c1d076a04db13a36781e80c3ddef8cd31a73409229,2025-05-27T21:15:22.310000
|
||||
CVE-2025-5064,0,0,5412602dfbe69e3fee5c3d5277c15337fff6fe96475eaf15941207c6ddef2f9d,2025-05-27T21:15:22.457000
|
||||
@ -295517,11 +295533,11 @@ CVE-2025-5073,0,0,baf1c84b4e2167692053943d4c0fd05e8f8f1a1d5bd906b6480eed1245a366
|
||||
CVE-2025-5074,0,0,9ba68eed20e336e3555aa374d8a228cbc63c1570f254cad86d2d34a36791d8af,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5075,0,0,3557427c3c8420f28dd5505d5532f5e698013ee739fdf7287e91d365cc97d126,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5076,0,0,a265efd0a028820c9cc3f4c11b758391961dd4fc4ffcbd490a4aa72d99696687,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5077,0,0,cf81ddf3855e45cd147cfd7c7be25296289304b97720caf90b928027abccdf00,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5078,0,0,df85c537c14582ba004ffd2b6a92d72a1ced9a8d3f4c98bcb4839f6491cd7d7f,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5079,0,0,02d5c4d06d5b360debb658e138db50131ce3cfcaf0a34013fdc121faa9ffe241,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5077,0,0,5bb361381f7737ab78bfa864953c20bd9e7bf1942fef8fedd416b02808d591ef,2025-05-28T01:53:25.660000
|
||||
CVE-2025-5078,0,0,57059c330cb53e9cb302cf773988b3ce2f731665e7a246772389547bf3f9a34e,2025-05-28T01:52:35.277000
|
||||
CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5cf,2025-05-28T01:50:48.303000
|
||||
CVE-2025-5080,0,0,0cab754d3cfde3d6b3a70ea302e2a63cd1cd3967167bff559ff2766fb5a65083,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5081,0,0,ecde03903b4e0c77270ee0ba286b46b025588f611ffa017092a0d00ce3f95461,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000
|
||||
CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000
|
||||
CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000
|
||||
@ -295648,7 +295664,7 @@ CVE-2025-5269,0,0,d6648849e120117658a5acbb7c16bd50f1ca75dd50023c661ee16daa0a44e5
|
||||
CVE-2025-5270,0,0,195d1ef223876a1ec6a8c475b807542100c76e8f13d2a0cc3fa336118c44e511,2025-05-27T18:15:37.290000
|
||||
CVE-2025-5271,0,0,c2c01f356cb96bac957222d1bd9c2ac4c9b8fcd9d264490b0acea16f5708168f,2025-05-27T18:15:37.647000
|
||||
CVE-2025-5272,0,0,8ec12de90a46bb3ebdf50942dc0dc925b2afae99ec7433fea0df5b77b7608dd5,2025-05-27T15:15:36.627000
|
||||
CVE-2025-5278,0,0,4e0b1b7e2263225630af8f91853ae0768e48246fd1734d5d49b2c463d552869e,2025-05-27T21:15:23.197000
|
||||
CVE-2025-5278,0,0,136a37aa0f1d08163203be01cae4e756c87c8835551b97d174bd708954d4fdc8,2025-05-28T01:15:19.730000
|
||||
CVE-2025-5279,0,0,4ae9b68433e92a9b98a184625269a81df7364baa91a596e5f693470b37bc9676,2025-05-27T21:15:23.370000
|
||||
CVE-2025-5280,0,0,5e36bf8d4d6b58866390a6b6e33e15d4ba11afa7a6cbce31f85ca477449203fb,2025-05-27T21:15:23.580000
|
||||
CVE-2025-5281,0,0,5fa8158ef4cf2e9ea1d36dc51d0f018cfaf38c242246d13b684663163c09dc0c,2025-05-27T21:15:23.717000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user