Compare commits

...

4 Commits

Author SHA1 Message Date
cad-safe-bot
e71791cf3c Auto-Update: 2025-05-28T08:00:19.223224+00:00 2025-05-28 08:03:56 +00:00
cad-safe-bot
eb2a834952 Auto-Update: 2025-05-28T06:00:19.345483+00:00 2025-05-28 06:03:54 +00:00
cad-safe-bot
f9bdb6cb00 Auto-Update: 2025-05-28T04:00:20.109578+00:00 2025-05-28 04:03:57 +00:00
cad-safe-bot
c7c5de384e Auto-Update: 2025-05-28T02:00:19.259080+00:00 2025-05-28 02:03:56 +00:00
54 changed files with 2588 additions and 259 deletions

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2023-41839",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:31.777",
"lastModified": "2025-05-28T04:15:31.777",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3669",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.487",
"lastModified": "2024-11-21T09:30:08.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:54:09.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.2",
"matchCriteriaId": "A76C0322-9500-4EB6-B10C-4574C576EB7C"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4096",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.723",
"lastModified": "2024-11-21T09:42:11.190",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:52:03.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdarko:responsive_tabs:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.0.11",
"matchCriteriaId": "6B431159-10A9-4EB8-9E3A-1A3C3AE3672F"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-48702",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:22.910",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:40:19.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPGurukul Old Age Home Management System v1.0 is vulnerable to HTML Injection via the searchdata parameter."
},
{
"lang": "es",
"value": "PHPGurukul Old Age Home Management System v1.0 es vulnerable a la inyecci\u00f3n de HTML a trav\u00e9s del par\u00e1metro searchdata."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:old_age_home_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1696E8-13EF-409E-BF90-C092ABEDFE50"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51101",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.093",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:42:23.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPGURUKUL Restaurant Table Booking System using PHP and MySQL v1.0 was discovered to contain a SQL injection vulnerability via the searchdata parameter at /rtbs/check-status.php."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que HPGURUKUL Restaurant Table Booking System que utiliza PHP y MySQL v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro searchdata en /rtbs/check-status.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02963BE3-61BC-41D5-82BA-71B773AA8FA0"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Restaurant%20Table%20Booking%20System%20using%20PHP%20and%20MySQL/SQL%20Injection-Search.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51106",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-19T15:15:22.583",
"lastModified": "2025-05-21T20:25:33.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:00:45.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-About%20Us.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51107",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.267",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:44:54.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /mcgs/admin/contactus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle, pagedes, and email parameters."
},
{
"lang": "es",
"value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en el componente /mcgs/admin/contactus.php de PHPGURUKUL Medical Card Generation System que utiliza PHP y MySQL v1.0 permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los par\u00e1metros pagetitle, pagedes y email."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Contact%20Us.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51108",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.440",
"lastModified": "2025-05-23T15:54:42.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:44:07.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /admin/card-bwdates-report.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the fromdate and todate parameters."
},
{
"lang": "es",
"value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en el componente /admin/card-bwdates-report.php de PHPGURUKUL Medical Card Generation System que utiliza PHP y MySQL v1.0 permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los par\u00e1metros fromdate y todate."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Between%20Dates%20Reports.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5765",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.823",
"lastModified": "2024-11-21T09:48:18.090",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:51:15.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpstickybar:wpstickybar:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.0",
"matchCriteriaId": "8A1E549D-DFF7-4E99-950B-DD3E7B510DAC"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5807",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.917",
"lastModified": "2024-11-21T09:48:22.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:50:36.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esterox:business_card:1.0.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "FB387573-2EBF-44FB-8B7F-F9D721E6CFC4"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5808",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.070",
"lastModified": "2024-11-21T09:48:22.213",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:49:06.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:masdiblogs:wp_ajax_contact_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.2",
"matchCriteriaId": "06F5E471-517C-49CA-9F13-AA736C4BC7C8"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5809",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.180",
"lastModified": "2024-11-21T09:48:22.387",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-28T00:46:20.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:masdiblogs:wp_ajax_contact_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.2",
"matchCriteriaId": "06F5E471-517C-49CA-9F13-AA736C4BC7C8"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5975",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.277",
"lastModified": "2024-11-21T09:48:40.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T00:42:32.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:contrive:cz_loan_management:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1",
"matchCriteriaId": "017403BA-0D67-447D-B098-EB04B99796DB"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25025",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T02:15:20.417",
"lastModified": "2025-05-28T02:15:20.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Guardium 12.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234827",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25026",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T02:15:20.583",
"lastModified": "2025-05-28T02:15:20.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Guardium 12.0 could allow an authenticated user to obtain sensitive information due to an incorrect authentication check."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234827",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25029",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T02:15:20.753",
"lastModified": "2025-05-28T02:15:20.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Guardium 12.0 could allow a privileged user to download any file on the system due to improper escaping of input."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234827",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3710",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:10.820",
"lastModified": "2025-05-12T17:32:52.810",
"lastModified": "2025-05-28T03:15:21.150",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3711",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:11.110",
"lastModified": "2025-05-12T17:32:52.810",
"lastModified": "2025-05-28T03:15:22.193",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3712",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:12.170",
"lastModified": "2025-05-12T17:32:52.810",
"lastModified": "2025-05-28T03:15:22.310",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3713",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:12.327",
"lastModified": "2025-05-12T17:32:52.810",
"lastModified": "2025-05-28T03:15:22.430",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3714",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:12.483",
"lastModified": "2025-05-12T17:32:52.810",
"lastModified": "2025-05-28T04:15:45.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
},
{
"lang": "es",

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-4009",
"sourceIdentifier": "research@onekey.com",
"published": "2025-05-28T07:15:24.490",
"lastModified": "2025-05-28T07:15:24.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Evertz SVDN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a\u00a0web management interface on port 80. This web management interface can be used by administrators to control product\nfeatures, setup network switching, and register license among other features. The application has been developed in PHP with\u00a0the webEASY SDK, also named \u2018ewb\u2019 by Evertz.\n\nThis web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.\n\nRemote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.\n\nThis level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "research@onekey.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:C/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "research@onekey.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009",
"source": "research@onekey.com"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48841",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:46.770",
"lastModified": "2025-05-28T04:15:46.770",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48842",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:47.390",
"lastModified": "2025-05-28T04:15:47.390",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48843",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:49.640",
"lastModified": "2025-05-28T04:15:49.640",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48844",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:49.917",
"lastModified": "2025-05-28T04:15:49.917",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48845",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:49.990",
"lastModified": "2025-05-28T04:15:49.990",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48846",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:50.067",
"lastModified": "2025-05-28T04:15:50.067",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48847",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:50.140",
"lastModified": "2025-05-28T04:15:50.140",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48848",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:50.207",
"lastModified": "2025-05-28T04:15:50.207",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-4800",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-05-28T06:15:22.000",
"lastModified": "2025-05-28T06:15:22.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://docs.stylemixthemes.com/masterstudy-lms/changelog-pro-version",
"source": "security@wordfence.com"
},
{
"url": "https://stylemixthemes.com/wordpress-lms-plugin/",
"source": "security@wordfence.com"
},
{
"url": "https://themeforest.net/item/masterstudy-education-center-wordpress-theme/12170274/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c170a228-4abd-4ee6-ba37-bdcde1cb7fc5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4816",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T04:16:20.577",
"lastModified": "2025-05-19T16:15:33.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T00:59:43.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309273",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309273",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.574129",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/8",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4817",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T04:16:20.797",
"lastModified": "2025-05-19T16:15:33.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T00:59:22.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/9",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309274",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309274",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.574178",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/9",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4818",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T05:15:51.597",
"lastModified": "2025-05-19T16:15:34.087",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T00:58:53.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/10",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309275",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309275",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.574219",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Xiaoyi-ing/CVE/issues/10",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4938",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T16:15:36.407",
"lastModified": "2025-05-21T20:25:16.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:33:36.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WuYanneko/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.309500",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309500",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.579848",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4939",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T16:15:36.620",
"lastModified": "2025-05-21T20:25:16.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:32:20.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,32 +142,82 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:credit_card_application_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0BFAAD8-0306-420B-B06D-F23D04AB2072"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.309502",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309502",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580119",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4941",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T17:15:28.883",
"lastModified": "2025-05-21T20:25:16.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:31:03.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:credit_card_application_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0BFAAD8-0306-420B-B06D-F23D04AB2072"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GIRISH05/Credit-card-application-management-system/blob/main/SQL-Injection.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.309504",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309504",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580167",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-4947",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2025-05-28T07:15:24.780",
"lastModified": "2025-05-28T07:15:24.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://curl.se/docs/CVE-2025-4947.html",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://curl.se/docs/CVE-2025-4947.json",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://hackerone.com/reports/3150884",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T22:15:19.410",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:25:25.310",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE80DE6-C79F-452F-9523-4EC1F9777DA4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/laifeng-boy/cve/issues/5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309657",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309657",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580192",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/laifeng-boy/cve/issues/5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T22:15:19.600",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:24:21.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,78 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/huangyi234/CVE/issues/4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309658",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309658",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580195",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
},
{
"url": "https://github.com/huangyi234/CVE/issues/4",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:19.530",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:20:50.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,77 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/huangyi234/CVE/issues/8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309659",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309659",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580201",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/huangyi234/CVE/issues/8",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:19.750",
"lastModified": "2025-05-21T20:24:58.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:16:17.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Zhaozhizhi/CVE/issues/3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309660",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.309660",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580248",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Zhaozhizhi/CVE/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:20.133",
"lastModified": "2025-05-21T23:15:55.200",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:06:49.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,77 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hhhanxx/attack/issues/18",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309662",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309662",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.580412",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/hhhanxx/attack/issues/18",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-5025",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2025-05-28T07:15:24.910",
"lastModified": "2025-05-28T07:15:24.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing."
}
],
"metrics": {},
"references": [
{
"url": "https://curl.se/docs/CVE-2025-5025.html",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://curl.se/docs/CVE-2025-5025.json",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://hackerone.com/reports/3153497",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-21T22:15:51.283",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T02:08:30.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Jacob-z691/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309877",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309877",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581373",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Jacob-z691/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-21T22:15:51.460",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T02:04:36.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Jacob-z691/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309878",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.309878",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581374",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Jacob-z691/CVE/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-21T23:15:55.683",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T02:02:49.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-434"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/snkercyber/CVE/issues/3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309879",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309879",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581391",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/snkercyber/CVE/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T14:16:09.230",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:53:25.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GeniusWang23/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309957",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.309957",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581431",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/GeniusWang23/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T14:16:09.523",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:52:35.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GeniusWang23/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309958",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309958",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581432",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/GeniusWang23/CVE/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T15:16:06.477",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:50:48.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dico-Z/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.309959",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309959",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.581439",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5081",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T16:15:56.697",
"lastModified": "2025-05-23T15:55:02.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-28T01:49:27.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:cybercafe_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76B02852-BBA6-49C7-82F9-A92F2DBFC0A5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wzylky/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.309961",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.309961",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.582065",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/wzylky/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5278",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-05-27T21:15:23.197",
"lastModified": "2025-05-27T21:15:23.197",
"lastModified": "2025-05-28T01:15:19.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368764",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/05/27/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-05-27T23:55:19.472504+00:00
2025-05-28T08:00:19.223224+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-05-27T23:15:21.400000+00:00
2025-05-28T07:15:24.910000+00:00
```
### Last Data Feed Release
@ -27,27 +27,23 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-05-27T00:00:04.320074+00:00
2025-05-28T00:00:04.313451+00:00
```
### Total Number of included CVEs
```plain
295654
295670
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `4`
- [CVE-2022-21150](CVE-2022/CVE-2022-211xx/CVE-2022-21150.json) (`2025-05-27T23:15:19.840`)
- [CVE-2022-21200](CVE-2022/CVE-2022-212xx/CVE-2022-21200.json) (`2025-05-27T23:15:20.490`)
- [CVE-2024-11185](CVE-2024/CVE-2024-111xx/CVE-2024-11185.json) (`2025-05-27T23:15:20.580`)
- [CVE-2024-45094](CVE-2024/CVE-2024-450xx/CVE-2024-45094.json) (`2025-05-27T23:15:21.093`)
- [CVE-2025-2796](CVE-2025/CVE-2025-27xx/CVE-2025-2796.json) (`2025-05-27T23:15:21.283`)
- [CVE-2025-2826](CVE-2025/CVE-2025-28xx/CVE-2025-2826.json) (`2025-05-27T23:15:21.400`)
- [CVE-2025-32440](CVE-2025/CVE-2025-324xx/CVE-2025-32440.json) (`2025-05-27T22:15:21.980`)
- [CVE-2025-40911](CVE-2025/CVE-2025-409xx/CVE-2025-40911.json) (`2025-05-27T22:15:22.337`)
- [CVE-2025-4009](CVE-2025/CVE-2025-40xx/CVE-2025-4009.json) (`2025-05-28T07:15:24.490`)
- [CVE-2025-4800](CVE-2025/CVE-2025-48xx/CVE-2025-4800.json) (`2025-05-28T06:15:22.000`)
- [CVE-2025-4947](CVE-2025/CVE-2025-49xx/CVE-2025-4947.json) (`2025-05-28T07:15:24.780`)
- [CVE-2025-5025](CVE-2025/CVE-2025-50xx/CVE-2025-5025.json) (`2025-05-28T07:15:24.910`)
### CVEs modified in the last Commit

View File

@ -190949,7 +190949,7 @@ CVE-2022-21147,0,0,53d42dff0ef971348abcbc9db3dccf42503f1205f0d61cae322fa8f9ff752
CVE-2022-21148,0,0,b4c937e47978f11ca1e16a1b6d1e86246877646fa0a67f66ccb9ef23bf990279,2025-05-05T17:17:39.760000
CVE-2022-21149,0,0,f3ae7567f3163786b900eb1a79db504939c5f01724410c388a986c59598624bd,2024-11-21T06:43:59.437000
CVE-2022-2115,0,0,3b0bfd60b400c603906316aedf310160bb240d4946ebcce85d7d85bb339ae37f,2024-11-21T07:00:20.630000
CVE-2022-21150,1,1,73af99be2ef6a1ec107afd973e876751c4cf1c849a91a5dd04fc97fab1a97ff6,2025-05-27T23:15:19.840000
CVE-2022-21150,0,0,73af99be2ef6a1ec107afd973e876751c4cf1c849a91a5dd04fc97fab1a97ff6,2025-05-27T23:15:19.840000
CVE-2022-21151,0,0,93b633642443edbb9a618ccace777742cd46371866dc45008734687fd210c4dd,2025-05-05T17:17:40
CVE-2022-21152,0,0,b6f1363434b71ccba44723b7c847dbfe5b198e98e7a674346d2e8d4b0c919e50,2025-05-05T17:17:40.817000
CVE-2022-21153,0,0,e312384a9ce26d515b19347cf80988cd1c5474a1f90514b58bfd29acb0034b59,2025-05-05T17:17:41.043000
@ -190998,7 +190998,7 @@ CVE-2022-21197,0,0,c84dea9b93bfc978b5467cd9a739ece8f41846103bdb2c6925cfc7478a3ef
CVE-2022-21198,0,0,1155a641fdf7c6c1229127e6fa4a1cc634cfb76a3942f96e24ba77fb0ceba70d,2025-02-04T18:15:29.893000
CVE-2022-21199,0,0,055fbcd11322cba3f7403cdce3bd9e8bbf4128df212ffbe4213a9fc5a19eef15,2024-11-21T06:44:05.567000
CVE-2022-2120,0,0,91491aa789c8d3e8f5740c6d2ca2cda651b114390fe24ccd573921c535e94c1f,2024-11-21T07:00:21.197000
CVE-2022-21200,1,1,0576b98bc61e8e27aaba7204bd609fefc4e419ef74671c40c0e5fe1246dae388,2025-05-27T23:15:20.490000
CVE-2022-21200,0,0,0576b98bc61e8e27aaba7204bd609fefc4e419ef74671c40c0e5fe1246dae388,2025-05-27T23:15:20.490000
CVE-2022-21201,0,0,a4e0197e75f2936b3b645b102670e01ddad1b696e4e752b3e65628adb198be0a,2024-11-21T06:44:05.670000
CVE-2022-21202,0,0,de1464aa17fa964c60b8c29cf8a7e5dc40be4a6ba7d04f8662a1c3aa6b2bd546,2024-11-21T06:44:05.777000
CVE-2022-21203,0,0,54568b987437a847f5d31726a301236c617930ea9392a11177e819c0241828a7,2025-05-05T17:17:43.880000
@ -233728,6 +233728,7 @@ CVE-2023-41834,0,0,fe97b040b6a12d18159971f3ffafabcd5d8334236b35f116720f5f615708a
CVE-2023-41835,0,0,ce7155b465e140a8e62b26a8d6d86203572f5bdb055ed610039eae08c9aef2e1,2024-11-21T08:21:46.180000
CVE-2023-41836,0,0,c3f04a6ef80b01f6ac7cd2e69564f223dd13bbcf85e284392104bb6022b1b1d0,2024-11-21T08:21:46.330000
CVE-2023-41838,0,0,952c54aae683059d62b494aadea90c0936995fec7c2c31e60fa8e87d00501e21,2024-11-21T08:21:46.483000
CVE-2023-41839,0,0,7c22c7560745c0193919f9882c2fff0f3a5a0bd9a40ff759ac0ae75da9136afe,2025-05-28T04:15:31.777000
CVE-2023-4184,0,0,60df463ab72975bdd1bf87dea9d6116251117803b12f9222b99bf19e9331ed2f,2024-11-21T08:34:34.303000
CVE-2023-41840,0,0,8d20f8abe065bcbe2c2d718ad7ceafc29f0c9c2f78c1e082d11032e68d2148f8,2024-11-21T08:21:46.637000
CVE-2023-41841,0,0,491f8782f84ae4bdd0c119a57acc5dfb8b3c40fff6f6761c378b72c883787aec,2024-11-21T08:21:46.777000
@ -246093,7 +246094,7 @@ CVE-2024-11181,0,0,a6b77044e6509fe3aca0bf2fdf8735020e45d95ff8f1e77d85c770a6e50da
CVE-2024-11182,0,0,fcbf84d76bd0ec5a6be96e0f2f3367a28021db9502432aff67df27ded6f18f2e,2025-05-21T18:44:12.623000
CVE-2024-11183,0,0,38a79fdf028e6d076b0c9ce59b96b7c75f295dd059f7e0b8602ad289d643763d,2025-05-06T21:25:00.510000
CVE-2024-11184,0,0,95b60c199ec8feaed7403cfeaeb615c0adf5827564743c751fc62910137c62e9,2025-01-06T21:15:13.693000
CVE-2024-11185,1,1,c6a17314ee52960d01f698ab8cdbbaad5a9c6a5fb6b7f626a2200ccec27553af,2025-05-27T23:15:20.580000
CVE-2024-11185,0,0,c6a17314ee52960d01f698ab8cdbbaad5a9c6a5fb6b7f626a2200ccec27553af,2025-05-27T23:15:20.580000
CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000
CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000
CVE-2024-11188,0,0,8070c22ab1552d28f4790f36fbb035b9ddec6883502131d83e84861dfa7e75e7,2024-11-23T06:15:17.570000
@ -262550,7 +262551,7 @@ CVE-2024-36681,0,0,96c1846f583101f7866c8fadfdf3a33b81ffcf4e96d0387c413dba15329c6
CVE-2024-36682,0,0,cb2995f0242062cfca7bdf65500013048768a2b6d65b1c25e30172054d0e0139,2024-11-21T09:22:32.397000
CVE-2024-36683,0,0,be595454ef8171db03a002d73c28446849c4fd224f6bc90a988dfe37de330fdc,2024-11-21T09:22:32.600000
CVE-2024-36684,0,0,8fab043b3364ae1eeedff575a1f0cbfbc03fa998f9cc28dd8bada425bf4a8acf,2024-11-21T09:22:32.807000
CVE-2024-3669,0,0,48e93d834169209b4a3103f1fa3909fb6e7a831db81a3ba76b06d37b3e787c9a,2024-11-21T09:30:08.690000
CVE-2024-3669,0,0,bf0d428440354671ae9f717d945ef28e9e393ce50c7ad5fdcc16412f8b06faf2,2025-05-28T00:54:09.360000
CVE-2024-36691,0,0,3dfc8ca2b0f56703968ad393c59292478596f8672b0393464c33aed3c63780aa,2024-11-21T09:22:33.040000
CVE-2024-36694,0,0,97e39bbb6c67fa2d3fcd0bc2d169d009680f66af761bc61f98a7f5a4b2e194ab,2025-04-22T15:36:02.527000
CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000
@ -265857,7 +265858,7 @@ CVE-2024-40956,0,0,f35dc66c569773537c41655b5b868e59e721e8f7ff6809d21084628e699c0
CVE-2024-40957,0,0,8c88dfffe800e3d85344951840f64f97a55eebeb79655fdcb09982a38c3f76d5,2024-11-21T09:31:56.810000
CVE-2024-40958,0,0,7495d58e5b81955176212788f60f87330a2e9c6bce5c3dd26de405b05b1f6533,2024-11-21T09:31:56.947000
CVE-2024-40959,0,0,0043be57531474631cc6de7737512d2ab0230deb9269189d29b950369a0fd17c,2024-11-21T09:31:57.090000
CVE-2024-4096,0,0,8de4935f6098b6eef1effebea5690d7854065723072ff76e21cbe24e62d668df,2024-11-21T09:42:11.190000
CVE-2024-4096,0,0,a6100502a92d8a5a161d019b647bc5dcd282882af1f3f803f74e649aaeea854a,2025-05-28T00:52:03.347000
CVE-2024-40960,0,0,d1b260bce7a6f4e3918591cefa3fd644d2061253ecfc0dec1722a192d1703af2,2024-11-21T09:31:57.263000
CVE-2024-40961,0,0,c323f131dac03e8f3736a795ce92c772336b6ee895d5ed1507aa424851c01204,2024-11-21T09:31:57.413000
CVE-2024-40962,0,0,1b32e5be99ff36031e51ef4af62c32f3376ebee25aa8774ef70b4bd4ef137e55,2025-01-07T16:10:10.253000
@ -269051,7 +269052,7 @@ CVE-2024-45088,0,0,1beec48fbebe975f8bc73123f865d04a7ed8df665a2d4af27f0cdfaad4366
CVE-2024-45089,0,0,542dfbf973be63b03ff718a4f3a8fab91d5b396d4bcab48b662c4f8c45834b4d,2025-03-05T18:26:20.030000
CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000
CVE-2024-45091,0,0,15b0a69c48e3ad122ef5c06eab93e452421cc3bec77edca18bcd67201ac2adaa,2025-01-29T21:12:41.107000
CVE-2024-45094,1,1,eac2452d1432b4c60a27953b2742ccdca4fbe302b18c5bcd9565d7950844128a,2025-05-27T23:15:21.093000
CVE-2024-45094,0,0,eac2452d1432b4c60a27953b2742ccdca4fbe302b18c5bcd9565d7950844128a,2025-05-27T23:15:21.093000
CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000
CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eeaa37,2024-09-06T12:51:59.750000
CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000
@ -271610,7 +271611,7 @@ CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7
CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000
CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000
CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000
CVE-2024-48702,0,0,307b904a666af6813868acd076c344b88453ac52a59c26a56b076304996e11e6,2025-05-23T15:54:42.643000
CVE-2024-48702,0,0,01ea8d7d8d70b95471496eea8001e6b5bc98a75e9594313b9cf5383c4cf9d75b,2025-05-28T01:40:19.143000
CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000
CVE-2024-48704,0,0,3893d860c5cbcfcb221edb7b511c8425d1a2b0fa61906308ba9350b2db11e150,2025-05-23T16:15:24.403000
CVE-2024-48706,0,0,c943b13c3a3939cb5d8b86b065bc2ddde43d7d1c2b6d276f98ff2b2d6bbb9294,2025-03-25T17:16:11.580000
@ -273566,12 +273567,12 @@ CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c
CVE-2024-51094,0,0,428eba4d2b25aa4f0722ef2b3d4daef54792a17342b2b8a3a1bd37dc73e6ba77,2025-05-22T17:28:00.107000
CVE-2024-51099,0,0,76299d701a4a326304643950fc6a06063189d1cf898039e5e4a1de0b1cac5f1f,2025-05-23T16:15:24.527000
CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000
CVE-2024-51101,0,0,fec8dd28bebab4662ba2a4d707a6d12c68a1d678f538f5ab886249855c7a1999,2025-05-23T15:54:42.643000
CVE-2024-51101,0,0,e4d47c0080321b806c8f657e0373e6db1fc5c5309326af02b3039c69f02cb6f9,2025-05-28T01:42:23.560000
CVE-2024-51102,0,0,97831955bfdf9790880422aa6ef84b830a8bb4e25861ffcd032c1ac1a29b89ef,2025-05-23T19:15:21.220000
CVE-2024-51103,0,0,f4b83b954d67fa14dd00f188cb7911f528eb31c3009429b0a9d4991a04725b3d,2025-05-23T16:15:24.643000
CVE-2024-51106,0,0,b4f066c6258fb1ca79f53921624ad8ee81faf462bcf70c6ebe65131d490bc5b7,2025-05-21T20:25:33.823000
CVE-2024-51107,0,0,d688abae21c988868a73bc1ff17121c383b72a833d19b71da23855711720f40e,2025-05-23T15:54:42.643000
CVE-2024-51108,0,0,40947e231ab684dad8551f526deae7e614b95f3363b2d658df8b035009d3076b,2025-05-23T15:54:42.643000
CVE-2024-51106,0,0,52316175fd89c5253300b2e14d9e26b21a88903277d9d4c00394f347fe89ca33,2025-05-28T01:00:45.410000
CVE-2024-51107,0,0,cbf01b3eee34c7b5a0cd560312505110cfa6f6be423a19b9a60a07d3542da8c4,2025-05-28T01:44:54.320000
CVE-2024-51108,0,0,70e9fc6e5f619b67ea5feb94e2f056d89d4c926a188193efb96358eb6c910327,2025-05-28T01:44:07.960000
CVE-2024-5111,0,0,afdc374c63208154122a1e480b379bf8aece87015a21eb603ff3e335d14b6fef,2025-02-21T20:09:47.700000
CVE-2024-51111,0,0,1b60f534839740b969e5474b088b0887cce9ab6321e3570e84fbd1d3290a378d,2025-01-06T18:15:20.060000
CVE-2024-51112,0,0,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000
@ -277806,7 +277807,7 @@ CVE-2024-57646,0,0,a888cdd5365c2b8dea460aeb56378a7623ae682bc07a8d0f9dec38273c362
CVE-2024-57647,0,0,d3984558393252e3df3fb667ed5c80aa1b991a2d6bc9d98908f75cf9cd4397fa,2025-04-17T16:47:19.220000
CVE-2024-57648,0,0,b7c7dc7ebc32322874d38b1745b034b539148709438f93be252e21212efcaa79,2025-04-17T16:47:16.813000
CVE-2024-57649,0,0,a90ba56c8166c25edf0ef2f87243dc95641782e6dd10bd8cd0ce7bb7dd78c660,2025-04-17T16:47:14.280000
CVE-2024-5765,0,0,8bc2294d6d7af965be603f90c65d8cabf573a7f7fa01fb8de5ef7a7fb2539707,2024-11-21T09:48:18.090000
CVE-2024-5765,0,0,92c5d8c017efa62598245e2a40eb941bba381c9d8565f04d08f00539e71e0cb2,2025-05-28T00:51:15.270000
CVE-2024-57650,0,0,d5ed05d0d2ef6d6244f24ea302a427ad0877aa33635ccb941889bd4ce3686559,2025-04-17T16:47:11.903000
CVE-2024-57651,0,0,62b1065be744d99f48fea1a3e7658cb0a92f791d0c8c9d29d94c4ab0ff0cc35a,2025-04-17T16:47:08.997000
CVE-2024-57652,0,0,8f20d5782dd9506a7196df3ec7850b57fabff337caf79c5adae6fcd0cd231a9e,2025-04-17T16:47:05.030000
@ -278127,7 +278128,7 @@ CVE-2024-58066,0,0,c6e3b768d006a4e502266d5440a1292003cf4ce5373a8e00bedbdf635b758
CVE-2024-58067,0,0,539fcaa5844135d8382de5294a58afb3d718ddb2522286dde14d2eb07f695970,2025-03-25T14:44:00.237000
CVE-2024-58068,0,0,c4222890e8d1bb8a6fd55e01d09dd9d69c7567be1d440d26b5a5d79630a65f7d,2025-03-25T14:47:07.467000
CVE-2024-58069,0,0,e74d8cad603e1620e828d4b3caac6e0ceb942144c73e5c456889b854714ef962,2025-03-25T14:48:40.760000
CVE-2024-5807,0,0,e39b8ad5e228368927b79aa56a54eaa43f3eaa14a89129cbf854c403a97f91d8,2024-11-21T09:48:22.057000
CVE-2024-5807,0,0,d4be4262d40bde5347e31b02a8283ace048206bfcacb514bc578a69101017b51,2025-05-28T00:50:36.617000
CVE-2024-58070,0,0,9c89d9904014e5d004d59e1f69fe53f6a2ec8e42ab0e66d5da1feebbb233b551,2025-03-25T14:21:57.697000
CVE-2024-58071,0,0,aab391a33ed2ebaff184b9ec4086049e627ecb3ac5f43dfc6d2aa871d74b66dc,2025-03-25T14:22:11.633000
CVE-2024-58072,0,0,d52e0da3f5c91d03028994ae6c07bb11e0728d624ff7bdc5d9ccc3a65443e2c9,2025-03-13T13:15:45.920000
@ -278138,7 +278139,7 @@ CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a1
CVE-2024-58077,0,0,f3ec17f492afe830e4bdffec9ee6935e46e28e5e78af48de044da0a78231897b,2025-03-06T17:15:21.123000
CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000
CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000
CVE-2024-5808,0,0,5a73a5618425d1f2d9eaf1f173cdff3fa455743e0b010bcc63eccd6f6e0c1652,2024-11-21T09:48:22.213000
CVE-2024-5808,0,0,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000
CVE-2024-58080,0,0,e3835bb895176f76b9629f1f45e7a50098fa6dc90a8d8933f702379f8bdec271,2025-03-25T14:27:18.737000
CVE-2024-58081,0,0,d14fd97d756a1cf5956e0eb5be64ade4f19b40adbeb5fcfa6440435351f38eb0,2025-03-25T14:27:38.820000
CVE-2024-58082,0,0,2224c338aeba3c6f1f3d7b825286f63e7ba1be753f0574b81f01302121977acc,2025-03-06T17:15:21.677000
@ -278149,7 +278150,7 @@ CVE-2024-58086,0,0,f1395b9bc6450b1446434126a0cdece082421cfdb9c768edd21ee2aefff1d
CVE-2024-58087,0,0,04a36bf48b3a2cdfea7da85ab1709b6a14fc57278f19e47877c4e4a8b19d5d33,2025-03-13T16:22:01.067000
CVE-2024-58088,0,0,548028057d678538b0d3a9c3c915640aea1986564c6a81f45d90000c55bd6831,2025-03-13T16:21:33.877000
CVE-2024-58089,0,0,c539e21863bf6d808e8f03e17c4063f4cf474cdca947eadd829ab37d0ca02025,2025-03-13T16:21:17.030000
CVE-2024-5809,0,0,0a5bf6a9d99e27af5b5a00b47f9d494997d7ec310ddf537ead1dec78e82e93bd,2024-11-21T09:48:22.387000
CVE-2024-5809,0,0,c4b8b59104f068ec24124c9d818f6d627fb564dbf53494b008a39765c54f9477,2025-05-28T00:46:20.463000
CVE-2024-58090,0,0,5d5a772ef85a7d7cf1764ffd3f4d817a84bbc6475cefed9abaaa898b75cace7a,2025-03-27T16:45:12.210000
CVE-2024-58091,0,0,bdb73265ec2113004990c5b046492ea3ca27cffddbcbc776a99f7489adfd4d1b,2025-03-27T16:45:12.210000
CVE-2024-58092,0,0,53f31227bd07354c6c789ed76152b430dbc15e4ab3c96f0045d950ec318a2250,2025-04-16T13:25:37.340000
@ -278354,7 +278355,7 @@ CVE-2024-5971,0,0,f03f53869694442f097b92cf60ccdd932b1bd24804d85a21f37d5d1a934565
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5973,0,0,5764fe7dba8a714456e598c82d1ba942598616db44809839e67ac1f6bf90f970,2024-11-21T09:48:40.297000
CVE-2024-5974,0,0,d125bc9130d6cdb44d098f1dba162d025003a48ce6f65b23901cdc8d897e2e84,2025-01-13T18:15:19.697000
CVE-2024-5975,0,0,1540d9cf16be3cdaab49810d2c22343710e6ed2f67972005f1fcea70f1fac8ea,2024-11-21T09:48:40.623000
CVE-2024-5975,0,0,3be3b53e1dab5331d0640ddf4a1f3b483a49f7699ffb58531a66efe441ae4f11,2025-05-28T00:42:32.570000
CVE-2024-5976,0,0,87c7e0aaf6cd0dcd3015a44e98f6c6317c749221800441ee90e6991faaa5d21d,2024-11-21T09:48:40.793000
CVE-2024-5977,0,0,909876bcbf4f2ad2839dc39ff9f402926337af028be37025b6a8c86d94af7f35,2024-11-21T09:48:40.960000
CVE-2024-5979,0,0,af718dd6f9c3a56a817df80eecdb8156b18063e36e493393439a223ddf585359,2024-11-21T09:48:41.093000
@ -287568,6 +287569,9 @@ CVE-2025-25014,0,0,647104a2327be5f1c7c985c2226368a66da33abeea590fea277f963925352
CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000
CVE-2025-25016,0,0,d83ceddcf1bcf084cd4544ad95cf9a19b953e3c151e0441bc0e4520196c8ad1f,2025-05-02T13:53:20.943000
CVE-2025-25023,0,0,074c065f09189eb031ac585458a2e1d09aaf15c120a072909abd4feb5fd42f37,2025-04-09T20:02:41.860000
CVE-2025-25025,0,0,51175f6f6820fc5f851da04a28029425565c96ca40249a30897b9927e1fa4df9,2025-05-28T02:15:20.417000
CVE-2025-25026,0,0,913a89931cf7d794e2984ce9c9070908f3ccbf7de7cf875dcc9a0cac87fa616c,2025-05-28T02:15:20.583000
CVE-2025-25029,0,0,070306c6d189398d41fa68d33581165f5e9fc679fe550088a4029ab8b935844e,2025-05-28T02:15:20.753000
CVE-2025-25035,0,0,4a2d0f672ce0e83b98c92e972e5b7eb6fa5e15f13c5c1cb0d71f8aaf6e12e24b,2025-03-21T19:15:45.437000
CVE-2025-25036,0,0,a8799abf886f32cf74fa3727668b9ee2d7cf5c4f840bf1724d07c64c2d8a39a5,2025-03-21T20:15:15.293000
CVE-2025-25039,0,0,6155e71068b69a4630ff4049b1126cd719aacb06ed44ea56a73c6de4d42c8922,2025-03-28T17:37:36.690000
@ -289357,7 +289361,7 @@ CVE-2025-27937,0,0,46e59abc87395fad933022253638fee740418314c08fa44c43852bb835ed4
CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000
CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000
CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000
CVE-2025-2796,1,1,0fbb630e2abe61aade417421e28e8d980bbaee928d1afe4ed72e70bd3970f2ae,2025-05-27T23:15:21.283000
CVE-2025-2796,0,0,0fbb630e2abe61aade417421e28e8d980bbaee928d1afe4ed72e70bd3970f2ae,2025-05-27T23:15:21.283000
CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000
CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000
CVE-2025-27980,0,0,d2f5f5ebada616a2bc11216168eecc9bced7938b2c036a22eb2533c1949980c8,2025-05-22T15:53:24.823000
@ -289470,7 +289474,7 @@ CVE-2025-2825,0,0,e4db2ec87b94dcda703a7cb29d9641a787a1d84d05d6f964d3ea9c8b54dfc7
CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000
CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18
CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
CVE-2025-2826,1,1,cde927b828c92118110a503a691e114965c68db4bf88b439a0626463e4906f70,2025-05-27T23:15:21.400000
CVE-2025-2826,0,0,cde927b828c92118110a503a691e114965c68db4bf88b439a0626463e4906f70,2025-05-27T23:15:21.400000
CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000
CVE-2025-2830,0,0,18f5acbcc1908730340a8cc830c427c3344653036d2c90e6b125301c8343cff5,2025-04-15T19:16:07.927000
CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000
@ -291905,7 +291909,7 @@ CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000
CVE-2025-3244,0,0,83385a875e2316aa8147e21cd040f4a5fd2ca8ba35219f944564cb0a256174d9,2025-05-14T21:07:17.220000
CVE-2025-32440,1,1,7687ef0eb2c76bab0ab5f35300721a80b41ea3da13903bdea0b6cb12719c2349,2025-05-27T22:15:21.980000
CVE-2025-32440,0,0,7687ef0eb2c76bab0ab5f35300721a80b41ea3da13903bdea0b6cb12719c2349,2025-05-27T22:15:21.980000
CVE-2025-32441,0,0,5d96695d99df210c451cb1297434489aa5ccf2a218059c2922743ca7b2a18209,2025-05-08T14:39:09.683000
CVE-2025-32442,0,0,3d727ddd988064a7ed8b991fa369d7c4d417f02766d256143d6103e1f774327c,2025-04-28T18:15:48.393000
CVE-2025-32444,0,0,040bc0b93f2555e371bd992e022bc009bca8f15a87bedbd2890deefa7d9aa25f,2025-05-02T13:53:40.163000
@ -292737,11 +292741,11 @@ CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493
CVE-2025-37087,0,0,20c409449e046fc0b07333a7d65b24c67907255590b88923cb6e09a524d20ee6,2025-05-01T22:15:17.647000
CVE-2025-37088,0,0,64ae2a894e2b0014068f1cc908ac2a8b164865977a9c111fb0dac895c15630cc,2025-04-25T15:15:36.593000
CVE-2025-3709,0,0,bd15d31f777243540548b544e8985e8a31e62890f7bf4ae13fef85062e09984a,2025-05-07T16:50:52.680000
CVE-2025-3710,0,0,5aa43f5fabdf7e9817af1de08a2142fd174a57fb507ed647c50bf588c3363b85,2025-05-12T17:32:52.810000
CVE-2025-3711,0,0,2b1f73f7c25e1131be9414f8abf0310a7225e0ede93e6016e7f8382780f6561d,2025-05-12T17:32:52.810000
CVE-2025-3712,0,0,dd9b463afaad18845257a3f3c051550600b24c3aea0efff51395845ccca7350c,2025-05-12T17:32:52.810000
CVE-2025-3713,0,0,154751ac02fbaf3aaf50af34492bc06e71aef0193ddb6a46a03e4d32dbca6a36,2025-05-12T17:32:52.810000
CVE-2025-3714,0,0,98a93e61a4a0bb6f50be73e9742e35c249ec9199635d808c3a34b4b6ca53a4ed,2025-05-12T17:32:52.810000
CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000
CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000
CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000
CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000
CVE-2025-3714,0,0,3fcd28d3a7b81c31d305f49be6e84a00b4570b4ee1caa0904bee1851b94e6d66,2025-05-28T04:15:45.850000
CVE-2025-3715,0,0,2d1d9dba7f9eff4431b265f83f4af3c259cac9ce8ddae0a96ec092e646ca8d2a,2025-05-19T13:35:20.460000
CVE-2025-3723,0,0,477418a320dfd53a6e935f7e337452b515033da0e585c9ca76a1582be0b01b2c,2025-05-12T20:40:10.330000
CVE-2025-3724,0,0,18e69c1094bab55d0abc5efd07a77f5bb56c4db0cf848fa0037b08e463c287e2,2025-05-12T20:40:24.853000
@ -293477,6 +293481,7 @@ CVE-2025-4005,0,0,3395f342452d81fe28f72171670472e990a8955faacab9ea9a30fcbc3d4e23
CVE-2025-4006,0,0,b4863f9bca9c45c782eac4e0a8df6c153136ca75006dde5bfd67dbac13da0ed2,2025-04-29T13:52:10.697000
CVE-2025-4007,0,0,9777df4491741671ed8bb32daaef6bd13e88a3bc80a38f81c67c7e3aae15aace,2025-04-29T13:52:10.697000
CVE-2025-4008,0,0,f0130f878a53471d3fb1549dc09ccb4cbdfcbe18d257d761f05f6b646d258a62,2025-05-23T08:15:18.633000
CVE-2025-4009,1,1,a48f90cd6b7bf84b4f335a72c36b7bc833d628e392db355b6779faa98ed5af8b,2025-05-28T07:15:24.490000
CVE-2025-4011,0,0,3819550e074b2f97f25ec51252193290e9c87c0a28a7aedb206338328c0e7b76,2025-04-29T13:52:10.697000
CVE-2025-40114,0,0,18b151536edb74ce6ae0abb057cdaf2f657d28b31cc048efaafef211823a9957,2025-04-29T13:46:29.167000
CVE-2025-4012,0,0,36dc3f78b0e7e3ac1f05487215ef307e4a3550924eb6d25961b0b1557c98be91,2025-05-12T19:30:30.873000
@ -293603,7 +293608,7 @@ CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b
CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000
CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000
CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000
CVE-2025-40911,1,1,5d617aa4f3c4bdbc7ab0031b95d2c6f4ae3adc9c4e4ba8d678d8f4330717f313,2025-05-27T22:15:22.337000
CVE-2025-40911,0,0,5d617aa4f3c4bdbc7ab0031b95d2c6f4ae3adc9c4e4ba8d678d8f4330717f313,2025-05-27T22:15:22.337000
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000
CVE-2025-4094,0,0,c4366c891a9ac824ae6e9d82e5a7df040ca58b43955f28a6e84c485206c2a693,2025-05-21T23:15:54.973000
@ -295160,6 +295165,7 @@ CVE-2025-47947,0,0,937e21e816ace6c7b2eea9b27977c70a0355dffa802eeb709a1580aec3fe9
CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefadd52,2025-05-19T15:15:25.400000
CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000
CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000
CVE-2025-4800,1,1,effbb959592fe4d51aa2f33071036fb2b9c5d78070f2c0d5ec37a9c50fcffec6,2025-05-28T06:15:22
CVE-2025-48009,0,0,f2f593603a23342f1ed10e6e06b800747a948e9a47401b873fcb7b9febb49dba,2025-05-21T20:24:58.133000
CVE-2025-48010,0,0,29ecfb7056487f862ce3f3d52a72af1a1c7498499e974227523a3feeadf25999,2025-05-21T20:24:58.133000
CVE-2025-48011,0,0,f7a7d415ad80812a779b1090cc64c6da9309fa4d9b5980d621fc83dfabfec97d,2025-05-21T20:24:58.133000
@ -295220,11 +295226,11 @@ CVE-2025-4814,0,0,701ab03b7a876ef5bc2e1ad888c3ec9b57b3290dbffe826cdd00c807fcd57d
CVE-2025-48144,0,0,d64923e40fdc0e7e404ab923fc3419b37f7c428f4d5f5c57ca1b8c036d0841cc,2025-05-19T13:35:20.460000
CVE-2025-48146,0,0,ab7aa4605de119e1b098c976e2765794696963be887a36cad3a72cd3dfef653e,2025-05-19T13:35:20.460000
CVE-2025-4815,0,0,d56932e9d68c28e8c84ba9340c5fe206f8693cbef9a54e1900a1c0e6a352f201,2025-05-19T16:15:33.753000
CVE-2025-4816,0,0,f14c1cfb83c8c6ed9a0698dfcc95775ad36a530b7fdf1e45228f3250bfb98f58,2025-05-19T16:15:33.863000
CVE-2025-4817,0,0,dd10739a15af78c4705e3e00a519aed353f304d46b521ddf484b8fc0fc2938a8,2025-05-19T16:15:33.977000
CVE-2025-4816,0,0,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000
CVE-2025-4817,0,0,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000
CVE-2025-48174,0,0,f26469907442315e96b5feb9308b03c4506fc8074c00574b934b171f795f26df,2025-05-16T14:42:18.700000
CVE-2025-48175,0,0,3f6bab737596fdb5634db37c0296a1b165ba48ea379824d01c7b1ce82612cf5b,2025-05-16T14:42:18.700000
CVE-2025-4818,0,0,65473837bd1909e5e7f653a7d28de0873bcc16d5c4c178e6d14886f055e06866,2025-05-19T16:15:34.087000
CVE-2025-4818,0,0,46d731a7fb69ff2dcbbabe2b3a403a7f0fce04438dcb8f5cef1cb1fefa0dfdd7,2025-05-28T00:58:53.250000
CVE-2025-48187,0,0,be9d0afeae04913d345ed4d335591274c105e6700369ecf88b41657ac12d62eb,2025-05-19T16:15:30.853000
CVE-2025-48188,0,0,9338f093747813e06d902a44455aea29fdf3a611a5e401cd7c2e67e28da8d86c,2025-05-19T13:35:20.460000
CVE-2025-4819,0,0,49caec14472d9713a5e005512e05ab68ec95bbd6e0ab80b85d595ebe6722e2cc,2025-05-19T13:35:20.460000
@ -295408,6 +295414,14 @@ CVE-2025-48827,0,0,a50f840283fd2bbc9a0c236b8e0a7afc67476d4ec5792331b9e1240a1d96c
CVE-2025-48828,0,0,7babaccf1c826448de50840a4963541ace772dfd59a97c487664d8dadaec9e30,2025-05-27T18:15:31.513000
CVE-2025-4883,0,0,5862fdd520821c1eedf697774db7196e34040fbccfc13f239bec6cec686b2e42,2025-05-21T19:38:13.727000
CVE-2025-4884,0,0,2d6b345f6687876df2d3e4cb744a5caa526ce300870cd564926a11af2bccc222,2025-05-19T13:35:20.460000
CVE-2025-48841,0,0,7f0e0c969efb3bef9720951c083cd77dcf55000205a06e477705e2d5154973aa,2025-05-28T04:15:46.770000
CVE-2025-48842,0,0,ba4bb2008ab25dba5eb316ee71e55945ac6c6e86998ead36e4c18bbc602b9af6,2025-05-28T04:15:47.390000
CVE-2025-48843,0,0,289fb4ccd51aa9f39fc7cb046c750bb2c9f1a40b8367b3b0a2c79fa22f4210f1,2025-05-28T04:15:49.640000
CVE-2025-48844,0,0,691afc4818b837f5124b1a7a449458230f6243d5fbc198f10ae02e1957b945fa,2025-05-28T04:15:49.917000
CVE-2025-48845,0,0,28c2c377a50b04054cbacd4d8a00509c2a1ec14792776b092a7a173a471a81fb,2025-05-28T04:15:49.990000
CVE-2025-48846,0,0,b4331e28b4548a0a81d0232dc77a343853591cec3e2f531b56c1d53501bb623a,2025-05-28T04:15:50.067000
CVE-2025-48847,0,0,b8563d91ba0679f627536816b3f17216a89f937d1a7db8c25b786323bd30235b,2025-05-28T04:15:50.140000
CVE-2025-48848,0,0,38731265ae915b14c5e915b02c11b0e53a54815641117da26fffd1c6f20ec7db,2025-05-28T04:15:50.207000
CVE-2025-4885,0,0,71690adb8bb16dc3b0abf632ff77fd8611dc09917588754b8c57e67fe3a44bd2,2025-05-19T13:35:20.460000
CVE-2025-4886,0,0,f0bc96dcd8776bcc92f543590bbb95ec4351295de136202b130c74e915ed1af1,2025-05-19T13:35:20.460000
CVE-2025-4887,0,0,a7b499ed3cdf6c879f3ec3b69793ad811740da88bfec778065c6ba52abd3d64a,2025-05-19T13:35:20.460000
@ -295460,11 +295474,12 @@ CVE-2025-4934,0,0,223d290223d766bd8fadc58a50b1e245df2a17d05c7a82ae8c467c7317c633
CVE-2025-4935,0,0,0924c431ea344338f09c6746a2eb896f1051ac5651ba0c066119ecf4a65489d5,2025-05-21T20:25:33.823000
CVE-2025-4936,0,0,52f00703e856a8895a4ad73331c7e04059651f0c33578ef1dfde1a53c8bf17d2,2025-05-21T20:25:33.823000
CVE-2025-4937,0,0,04c10f6938329dfd4cb4a045dea1d120d3485da87d3dc89f52a5fd817e2ecd60,2025-05-21T20:25:33.823000
CVE-2025-4938,0,0,869000ce212a95a4f151806c116520d3892cf0d02e418337c2a222fe633e7492,2025-05-21T20:25:16.407000
CVE-2025-4939,0,0,900a9898cac9c0072a6851a87a1fc394fc59a43f240149c960c6ba983fe7fa0a,2025-05-21T20:25:16.407000
CVE-2025-4938,0,0,9bfbb8aefdfbb754eacbb83a30a05c557a118de2c85e31be873a9e69bcb3eeca,2025-05-28T01:33:36.677000
CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000
CVE-2025-4940,0,0,2476264f5ca230e398816216f503ad21bd6ee0718fc81a3cc8e1ef1268a9a775,2025-05-21T20:25:16.407000
CVE-2025-4941,0,0,82d771500a33f9b956507ffd28047b96677ad4beb2427845b21268f137b2c892,2025-05-21T20:25:16.407000
CVE-2025-4941,0,0,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000
CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000
CVE-2025-4947,1,1,41b4309526023f35da5d8a9cbf74ea981242bfda1f99d26c1c00c59137d84ac7,2025-05-28T07:15:24.780000
CVE-2025-4948,0,0,dbe30938d8190315dbaa2e8d5919e8362721c3330df496b34aaab2abe9515761,2025-05-26T12:15:23.963000
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
@ -295481,17 +295496,18 @@ CVE-2025-4998,0,0,a06730a0691f90a016a49869bfa33e7c322397c4e2518cd0a37207b1507563
CVE-2025-4999,0,0,13735415b149480bfb9de9a45e935c4947f4c7ec7df58eed18894635f565eb11,2025-05-21T20:24:58.133000
CVE-2025-5000,0,0,b88fb5c3c6d713007bd8f08b5b98b94c4b65f452e1cfcae4950b23010aca8b7a,2025-05-21T20:24:58.133000
CVE-2025-5001,0,0,31ad5c5ea8790484d4eb2202eb4a0629e0128642e382cfb8927c9b9893b4fc3b,2025-05-21T20:24:58.133000
CVE-2025-5002,0,0,aa550d09179c9601bc82e597278e3339b109c2d213b463d7ead2b28dedc0c87f,2025-05-21T20:24:58.133000
CVE-2025-5003,0,0,9a44f46b154e04fe5f03f8443daf3417b6856b5aba0b0c5c35c060291d7e4b67,2025-05-21T20:24:58.133000
CVE-2025-5004,0,0,98a1e99d8b9fad0ef327b4c81df373b549ef5dd0fa093c7d9c1f1be9f199e7b0,2025-05-21T20:24:58.133000
CVE-2025-5006,0,0,729926df09abb067b82af766b59c94064c0f4dede57c63b42c7f94d4794cc929,2025-05-21T20:24:58.133000
CVE-2025-5002,0,0,971f36c284dfb1e294c2db4acf298a0f7591c6e0e260cfb633ad289f7903a4d3,2025-05-28T01:25:25.310000
CVE-2025-5003,0,0,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000
CVE-2025-5004,0,0,d7fd9b6c8114c9ac860c14fa88897684c73b2b8251dca41c12cda3a8ce9d421c,2025-05-28T01:20:50.517000
CVE-2025-5006,0,0,681cabb0d000288ea3de1bc96c248c8dc62af67d94cda924b490a24cb5ce4b87,2025-05-28T01:16:17.537000
CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000
CVE-2025-5008,0,0,895e1964dc0670383faa4bfe12d1cb725d77ab879d8cc70a1871495cd50c3e48,2025-05-21T23:15:55.200000
CVE-2025-5008,0,0,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d57,2025-05-28T01:06:49.867000
CVE-2025-5010,0,0,93497e2b48b334d59fac1bb8ca9073e5f336f986ef89ce0b89f9db876e65e870,2025-05-21T23:15:55.330000
CVE-2025-5011,0,0,d1caeeaa784d143902e41e16fc8809733bc411c4665df188f33764965bcab2ec,2025-05-21T23:15:55.447000
CVE-2025-5013,0,0,9e2206cee3d9a4da13b7d790d61a24286d0c704fc74b7b095d3cf27be2eea613,2025-05-21T23:15:55.563000
CVE-2025-5020,0,0,8e92e81268cb02470f5321fbe111bd1217491079f6b87fc538686f0917f7768a,2025-05-21T20:24:58.133000
CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000
CVE-2025-5025,1,1,7453e6923eb1a45f61a94bcc35c54f4d6c6e3d7ea83c8b1a686b8ff6ef78a86a,2025-05-28T07:15:24.910000
CVE-2025-5029,0,0,ecb9afcd5e588564920b0ea2535593ae37c1896d06cac3ff8323350bc3b94721,2025-05-21T20:24:58.133000
CVE-2025-5030,0,0,524bdc59d3cf3de128931a2064721f0c18eb0893fa1e7a140dbc00738f726523,2025-05-21T20:24:58.133000
CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000
@ -295503,10 +295519,10 @@ CVE-2025-5051,0,0,9c110d30fb7d5b76a834a2709876396dbb061a47276883a9c8b6f8ca7926c4
CVE-2025-5052,0,0,aa387e74996184bbceb7dcb0f0533b96402b1f03de23f558fcebbd4c6085f924,2025-05-23T15:55:02.040000
CVE-2025-5053,0,0,d1f3d03feac0d168cc0b9fceb4dacff5c6f1aabc5f310733ca2bf60999576839,2025-05-23T15:55:02.040000
CVE-2025-5055,0,0,d4a91ae5f00ddb3d7d93c133377af96d82720d9fe60fd3aa075ce0c3c6bb5ff8,2025-05-24T03:15:24.523000
CVE-2025-5056,0,0,5d828001fcf3a0c7199423756892ef7203d79c93ef8f9b9ff6a40503329589d2,2025-05-23T15:55:02.040000
CVE-2025-5057,0,0,9ab19a2c6361cda5644cf55ac09c66d34ed104e148938809e5ea8cd6c9f9297f,2025-05-23T15:55:02.040000
CVE-2025-5056,0,0,41abcc4b21c4c44af1bb2b5ebe6eed640fd93ff380221b407c4bb670519af696,2025-05-28T02:08:30.840000
CVE-2025-5057,0,0,c177a6255394eb47f572d99869089826f5992edac771e2e307615417afe5454f,2025-05-28T02:04:36.163000
CVE-2025-5058,0,0,33bbc180837c7bff4c1df8f50429e7ffffb5678857a47e56a7d4d34987379b2f,2025-05-24T04:15:32.560000
CVE-2025-5059,0,0,05a7e8fd4cdbbb0bda914599a983f96db3a6a250cd413b41e5799b0229b6e3b4,2025-05-23T15:55:02.040000
CVE-2025-5059,0,0,f8f742257ec34ff8db6f494385cd1222a7c04c23d48b685959ae7dfe1442b4eb,2025-05-28T02:02:49.230000
CVE-2025-5062,0,0,bb09b5c3154dbeb834d9f154b075fadf5acce7938c0b0ea58fb15d93688394c5,2025-05-23T15:55:02.040000
CVE-2025-5063,0,0,22ca900734388c6e87a6f1c1d076a04db13a36781e80c3ddef8cd31a73409229,2025-05-27T21:15:22.310000
CVE-2025-5064,0,0,5412602dfbe69e3fee5c3d5277c15337fff6fe96475eaf15941207c6ddef2f9d,2025-05-27T21:15:22.457000
@ -295517,11 +295533,11 @@ CVE-2025-5073,0,0,baf1c84b4e2167692053943d4c0fd05e8f8f1a1d5bd906b6480eed1245a366
CVE-2025-5074,0,0,9ba68eed20e336e3555aa374d8a228cbc63c1570f254cad86d2d34a36791d8af,2025-05-23T15:55:02.040000
CVE-2025-5075,0,0,3557427c3c8420f28dd5505d5532f5e698013ee739fdf7287e91d365cc97d126,2025-05-23T15:55:02.040000
CVE-2025-5076,0,0,a265efd0a028820c9cc3f4c11b758391961dd4fc4ffcbd490a4aa72d99696687,2025-05-23T15:55:02.040000
CVE-2025-5077,0,0,cf81ddf3855e45cd147cfd7c7be25296289304b97720caf90b928027abccdf00,2025-05-23T15:55:02.040000
CVE-2025-5078,0,0,df85c537c14582ba004ffd2b6a92d72a1ced9a8d3f4c98bcb4839f6491cd7d7f,2025-05-23T15:55:02.040000
CVE-2025-5079,0,0,02d5c4d06d5b360debb658e138db50131ce3cfcaf0a34013fdc121faa9ffe241,2025-05-23T15:55:02.040000
CVE-2025-5077,0,0,5bb361381f7737ab78bfa864953c20bd9e7bf1942fef8fedd416b02808d591ef,2025-05-28T01:53:25.660000
CVE-2025-5078,0,0,57059c330cb53e9cb302cf773988b3ce2f731665e7a246772389547bf3f9a34e,2025-05-28T01:52:35.277000
CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5cf,2025-05-28T01:50:48.303000
CVE-2025-5080,0,0,0cab754d3cfde3d6b3a70ea302e2a63cd1cd3967167bff559ff2766fb5a65083,2025-05-23T15:55:02.040000
CVE-2025-5081,0,0,ecde03903b4e0c77270ee0ba286b46b025588f611ffa017092a0d00ce3f95461,2025-05-23T15:55:02.040000
CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000
CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000
CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000
CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000
@ -295648,7 +295664,7 @@ CVE-2025-5269,0,0,d6648849e120117658a5acbb7c16bd50f1ca75dd50023c661ee16daa0a44e5
CVE-2025-5270,0,0,195d1ef223876a1ec6a8c475b807542100c76e8f13d2a0cc3fa336118c44e511,2025-05-27T18:15:37.290000
CVE-2025-5271,0,0,c2c01f356cb96bac957222d1bd9c2ac4c9b8fcd9d264490b0acea16f5708168f,2025-05-27T18:15:37.647000
CVE-2025-5272,0,0,8ec12de90a46bb3ebdf50942dc0dc925b2afae99ec7433fea0df5b77b7608dd5,2025-05-27T15:15:36.627000
CVE-2025-5278,0,0,4e0b1b7e2263225630af8f91853ae0768e48246fd1734d5d49b2c463d552869e,2025-05-27T21:15:23.197000
CVE-2025-5278,0,0,136a37aa0f1d08163203be01cae4e756c87c8835551b97d174bd708954d4fdc8,2025-05-28T01:15:19.730000
CVE-2025-5279,0,0,4ae9b68433e92a9b98a184625269a81df7364baa91a596e5f693470b37bc9676,2025-05-27T21:15:23.370000
CVE-2025-5280,0,0,5e36bf8d4d6b58866390a6b6e33e15d4ba11afa7a6cbce31f85ca477449203fb,2025-05-27T21:15:23.580000
CVE-2025-5281,0,0,5fa8158ef4cf2e9ea1d36dc51d0f018cfaf38c242246d13b684663163c09dc0c,2025-05-27T21:15:23.717000

Can't render this file because it is too large.