Compare commits

...

4 Commits

Author SHA1 Message Date
cad-safe-bot
e71791cf3c Auto-Update: 2025-05-28T08:00:19.223224+00:00 2025-05-28 08:03:56 +00:00
cad-safe-bot
eb2a834952 Auto-Update: 2025-05-28T06:00:19.345483+00:00 2025-05-28 06:03:54 +00:00
cad-safe-bot
f9bdb6cb00 Auto-Update: 2025-05-28T04:00:20.109578+00:00 2025-05-28 04:03:57 +00:00
cad-safe-bot
c7c5de384e Auto-Update: 2025-05-28T02:00:19.259080+00:00 2025-05-28 02:03:56 +00:00
54 changed files with 2588 additions and 259 deletions

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2023-41839",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:31.777",
"lastModified": "2025-05-28T04:15:31.777",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3669", "id": "CVE-2024-3669",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.487", "published": "2024-07-30T06:15:02.487",
"lastModified": "2024-11-21T09:30:08.690", "lastModified": "2025-05-28T00:54:09.360",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.2",
"matchCriteriaId": "A76C0322-9500-4EB6-B10C-4574C576EB7C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/", "url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/", "url": "https://wpscan.com/vulnerability/3c37c9a9-1424-427a-adc7-c2336a47e9cf/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4096", "id": "CVE-2024-4096",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.723", "published": "2024-07-30T06:15:02.723",
"lastModified": "2024-11-21T09:42:11.190", "lastModified": "2025-05-28T00:52:03.347",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdarko:responsive_tabs:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.0.11",
"matchCriteriaId": "6B431159-10A9-4EB8-9E3A-1A3C3AE3672F"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/", "url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/", "url": "https://wpscan.com/vulnerability/4dba5e9e-24be-458a-9150-7c7a958e66cb/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-48702", "id": "CVE-2024-48702",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:22.910", "published": "2025-05-23T15:15:22.910",
"lastModified": "2025-05-23T15:54:42.643", "lastModified": "2025-05-28T01:40:19.143",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "PHPGurukul Old Age Home Management System v1.0 is vulnerable to HTML Injection via the searchdata parameter." "value": "PHPGurukul Old Age Home Management System v1.0 is vulnerable to HTML Injection via the searchdata parameter."
},
{
"lang": "es",
"value": "PHPGurukul Old Age Home Management System v1.0 es vulnerable a la inyecci\u00f3n de HTML a trav\u00e9s del par\u00e1metro searchdata."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:old_age_home_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1696E8-13EF-409E-BF90-C092ABEDFE50"
}
]
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf", "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51101", "id": "CVE-2024-51101",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.093", "published": "2025-05-23T15:15:23.093",
"lastModified": "2025-05-23T15:54:42.643", "lastModified": "2025-05-28T01:42:23.560",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "PHPGURUKUL Restaurant Table Booking System using PHP and MySQL v1.0 was discovered to contain a SQL injection vulnerability via the searchdata parameter at /rtbs/check-status.php." "value": "PHPGURUKUL Restaurant Table Booking System using PHP and MySQL v1.0 was discovered to contain a SQL injection vulnerability via the searchdata parameter at /rtbs/check-status.php."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que HPGURUKUL Restaurant Table Booking System que utiliza PHP y MySQL v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro searchdata en /rtbs/check-status.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02963BE3-61BC-41D5-82BA-71B773AA8FA0"
}
]
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Restaurant%20Table%20Booking%20System%20using%20PHP%20and%20MySQL/SQL%20Injection-Search.pdf", "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Restaurant%20Table%20Booking%20System%20using%20PHP%20and%20MySQL/SQL%20Injection-Search.pdf",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51106", "id": "CVE-2024-51106",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-19T15:15:22.583", "published": "2025-05-19T15:15:22.583",
"lastModified": "2025-05-21T20:25:33.823", "lastModified": "2025-05-28T01:00:45.410",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-About%20Us.pdf", "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-About%20Us.pdf",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51107", "id": "CVE-2024-51107",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.267", "published": "2025-05-23T15:15:23.267",
"lastModified": "2025-05-23T15:54:42.643", "lastModified": "2025-05-28T01:44:54.320",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /mcgs/admin/contactus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle, pagedes, and email parameters." "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /mcgs/admin/contactus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle, pagedes, and email parameters."
},
{
"lang": "es",
"value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en el componente /mcgs/admin/contactus.php de PHPGURUKUL Medical Card Generation System que utiliza PHP y MySQL v1.0 permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los par\u00e1metros pagetitle, pagedes y email."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Contact%20Us.pdf", "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Contact%20Us.pdf",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,20 +2,80 @@
"id": "CVE-2024-51108", "id": "CVE-2024-51108",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.440", "published": "2025-05-23T15:15:23.440",
"lastModified": "2025-05-23T15:54:42.643", "lastModified": "2025-05-28T01:44:07.960",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /admin/card-bwdates-report.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the fromdate and todate parameters." "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the component /admin/card-bwdates-report.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the fromdate and todate parameters."
},
{
"lang": "es",
"value": "Varias vulnerabilidades de cross-site scripting (XSS) almacenado en el componente /admin/card-bwdates-report.php de PHPGURUKUL Medical Card Generation System que utiliza PHP y MySQL v1.0 permiten a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los par\u00e1metros fromdate y todate."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E7C461-FAC5-4BD1-904E-78F50194B593"
}
]
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Between%20Dates%20Reports.pdf", "url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-Between%20Dates%20Reports.pdf",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5765", "id": "CVE-2024-5765",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.823", "published": "2024-07-30T06:15:02.823",
"lastModified": "2024-11-21T09:48:18.090", "lastModified": "2025-05-28T00:51:15.270",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpstickybar:wpstickybar:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.0",
"matchCriteriaId": "8A1E549D-DFF7-4E99-950B-DD3E7B510DAC"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/", "url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/", "url": "https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5807", "id": "CVE-2024-5807",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:02.917", "published": "2024-07-30T06:15:02.917",
"lastModified": "2024-11-21T09:48:22.057", "lastModified": "2025-05-28T00:50:36.617",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,51 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esterox:business_card:1.0.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "FB387573-2EBF-44FB-8B7F-F9D721E6CFC4"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/", "url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/", "url": "https://wpscan.com/vulnerability/badb16b5-8c06-4170-b605-ea7af8982c1f/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5808", "id": "CVE-2024-5808",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.070", "published": "2024-07-30T06:15:03.070",
"lastModified": "2024-11-21T09:48:22.213", "lastModified": "2025-05-28T00:49:06.347",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:masdiblogs:wp_ajax_contact_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.2",
"matchCriteriaId": "06F5E471-517C-49CA-9F13-AA736C4BC7C8"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/", "url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/", "url": "https://wpscan.com/vulnerability/1783bbce-3cc3-4a7e-a491-b713cee8278b/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5809", "id": "CVE-2024-5809",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.180", "published": "2024-07-30T06:15:03.180",
"lastModified": "2024-11-21T09:48:22.387", "lastModified": "2025-05-28T00:46:20.463",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:masdiblogs:wp_ajax_contact_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.2",
"matchCriteriaId": "06F5E471-517C-49CA-9F13-AA736C4BC7C8"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/", "url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/", "url": "https://wpscan.com/vulnerability/0af9fbcf-5f0e-4f7f-ae60-b46e704cf0a5/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5975", "id": "CVE-2024-5975",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.277", "published": "2024-07-30T06:15:03.277",
"lastModified": "2024-11-21T09:48:40.623", "lastModified": "2025-05-28T00:42:32.570",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:contrive:cz_loan_management:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1",
"matchCriteriaId": "017403BA-0D67-447D-B098-EB04B99796DB"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/", "url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/", "url": "https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25025",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T02:15:20.417",
"lastModified": "2025-05-28T02:15:20.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Guardium 12.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234827",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25026",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T02:15:20.583",
"lastModified": "2025-05-28T02:15:20.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Guardium 12.0 could allow an authenticated user to obtain sensitive information due to an incorrect authentication check."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234827",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-25029",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-05-28T02:15:20.753",
"lastModified": "2025-05-28T02:15:20.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Guardium 12.0 could allow a privileged user to download any file on the system due to improper escaping of input."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7234827",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3710", "id": "CVE-2025-3710",
"sourceIdentifier": "twcert@cert.org.tw", "sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:10.820", "published": "2025-05-09T04:16:10.820",
"lastModified": "2025-05-12T17:32:52.810", "lastModified": "2025-05-28T03:15:21.150",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device." "value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3711", "id": "CVE-2025-3711",
"sourceIdentifier": "twcert@cert.org.tw", "sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:11.110", "published": "2025-05-09T04:16:11.110",
"lastModified": "2025-05-12T17:32:52.810", "lastModified": "2025-05-28T03:15:22.193",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device." "value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3712", "id": "CVE-2025-3712",
"sourceIdentifier": "twcert@cert.org.tw", "sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:12.170", "published": "2025-05-09T04:16:12.170",
"lastModified": "2025-05-12T17:32:52.810", "lastModified": "2025-05-28T03:15:22.310",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack." "value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3713", "id": "CVE-2025-3713",
"sourceIdentifier": "twcert@cert.org.tw", "sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:12.327", "published": "2025-05-09T04:16:12.327",
"lastModified": "2025-05-12T17:32:52.810", "lastModified": "2025-05-28T03:15:22.430",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack." "value": "The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to perform a denial-of-service attack."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3714", "id": "CVE-2025-3714",
"sourceIdentifier": "twcert@cert.org.tw", "sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-05-09T04:16:12.483", "published": "2025-05-09T04:16:12.483",
"lastModified": "2025-05-12T17:32:52.810", "lastModified": "2025-05-28T04:15:45.850",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device." "value": "The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer Overflow vulnerability in firmware versions prior to v2.2.215, allowing unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-4009",
"sourceIdentifier": "research@onekey.com",
"published": "2025-05-28T07:15:24.490",
"lastModified": "2025-05-28T07:15:24.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Evertz SVDN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a\u00a0web management interface on port 80. This web management interface can be used by administrators to control product\nfeatures, setup network switching, and register license among other features. The application has been developed in PHP with\u00a0the webEASY SDK, also named \u2018ewb\u2019 by Evertz.\n\nThis web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.\n\nRemote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.\n\nThis level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "research@onekey.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:C/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "research@onekey.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009",
"source": "research@onekey.com"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48841",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:46.770",
"lastModified": "2025-05-28T04:15:46.770",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48842",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:47.390",
"lastModified": "2025-05-28T04:15:47.390",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48843",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:49.640",
"lastModified": "2025-05-28T04:15:49.640",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48844",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:49.917",
"lastModified": "2025-05-28T04:15:49.917",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48845",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:49.990",
"lastModified": "2025-05-28T04:15:49.990",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48846",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:50.067",
"lastModified": "2025-05-28T04:15:50.067",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48847",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:50.140",
"lastModified": "2025-05-28T04:15:50.140",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-48848",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-05-28T04:15:50.207",
"lastModified": "2025-05-28T04:15:50.207",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-4800",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-05-28T06:15:22.000",
"lastModified": "2025-05-28T06:15:22.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://docs.stylemixthemes.com/masterstudy-lms/changelog-pro-version",
"source": "security@wordfence.com"
},
{
"url": "https://stylemixthemes.com/wordpress-lms-plugin/",
"source": "security@wordfence.com"
},
{
"url": "https://themeforest.net/item/masterstudy-education-center-wordpress-theme/12170274/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c170a228-4abd-4ee6-ba37-bdcde1cb7fc5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4816", "id": "CVE-2025-4816",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T04:16:20.577", "published": "2025-05-17T04:16:20.577",
"lastModified": "2025-05-19T16:15:33.863", "lastModified": "2025-05-28T00:59:43.940",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/Xiaoyi-ing/CVE/issues/8", "url": "https://github.com/Xiaoyi-ing/CVE/issues/8",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309273", "url": "https://vuldb.com/?ctiid.309273",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309273", "url": "https://vuldb.com/?id.309273",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.574129", "url": "https://vuldb.com/?submit.574129",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.sourcecodester.com/", "url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/Xiaoyi-ing/CVE/issues/8", "url": "https://github.com/Xiaoyi-ing/CVE/issues/8",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4817", "id": "CVE-2025-4817",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T04:16:20.797", "published": "2025-05-17T04:16:20.797",
"lastModified": "2025-05-19T16:15:33.977", "lastModified": "2025-05-28T00:59:22.280",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/Xiaoyi-ing/CVE/issues/9", "url": "https://github.com/Xiaoyi-ing/CVE/issues/9",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309274", "url": "https://vuldb.com/?ctiid.309274",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309274", "url": "https://vuldb.com/?id.309274",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.574178", "url": "https://vuldb.com/?submit.574178",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.sourcecodester.com/", "url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/Xiaoyi-ing/CVE/issues/9", "url": "https://github.com/Xiaoyi-ing/CVE/issues/9",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4818", "id": "CVE-2025-4818",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-17T05:15:51.597", "published": "2025-05-17T05:15:51.597",
"lastModified": "2025-05-19T16:15:34.087", "lastModified": "2025-05-28T00:58:53.250",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hshnudr:doctors_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E469DD8D-C6DD-490F-94D6-2BE543B220E5"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/Xiaoyi-ing/CVE/issues/10", "url": "https://github.com/Xiaoyi-ing/CVE/issues/10",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309275", "url": "https://vuldb.com/?ctiid.309275",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309275", "url": "https://vuldb.com/?id.309275",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.574219", "url": "https://vuldb.com/?submit.574219",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.sourcecodester.com/", "url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/Xiaoyi-ing/CVE/issues/10", "url": "https://github.com/Xiaoyi-ing/CVE/issues/10",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4938", "id": "CVE-2025-4938",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T16:15:36.407", "published": "2025-05-19T16:15:36.407",
"lastModified": "2025-05-21T20:25:16.407", "lastModified": "2025-05-28T01:33:36.677",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -63,7 +63,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/WuYanneko/CVE/issues/2", "url": "https://github.com/WuYanneko/CVE/issues/2",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://phpgurukul.com/", "url": "https://phpgurukul.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309500", "url": "https://vuldb.com/?ctiid.309500",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309500", "url": "https://vuldb.com/?id.309500",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.579848", "url": "https://vuldb.com/?submit.579848",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4939", "id": "CVE-2025-4939",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T16:15:36.620", "published": "2025-05-19T16:15:36.620",
"lastModified": "2025-05-21T20:25:16.407", "lastModified": "2025-05-28T01:32:20.263",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,82 @@
"value": "CWE-94" "value": "CWE-94"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:credit_card_application_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0BFAAD8-0306-420B-B06D-F23D04AB2072"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md", "url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://phpgurukul.com/", "url": "https://phpgurukul.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309502", "url": "https://vuldb.com/?ctiid.309502",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309502", "url": "https://vuldb.com/?id.309502",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.580119", "url": "https://vuldb.com/?submit.580119",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md", "url": "https://github.com/GIRISH05/credit-card-application-management-system-using-php-and-mysql/blob/main/Stored%20Cross-Site%20Scripting%20(XSS).md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-4941", "id": "CVE-2025-4941",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-19T17:15:28.883", "published": "2025-05-19T17:15:28.883",
"lastModified": "2025-05-21T20:25:16.407", "lastModified": "2025-05-28T01:31:03.773",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -63,7 +63,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,28 +142,74 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:credit_card_application_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0BFAAD8-0306-420B-B06D-F23D04AB2072"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/GIRISH05/Credit-card-application-management-system/blob/main/SQL-Injection.md", "url": "https://github.com/GIRISH05/Credit-card-application-management-system/blob/main/SQL-Injection.md",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://phpgurukul.com/", "url": "https://phpgurukul.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309504", "url": "https://vuldb.com/?ctiid.309504",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309504", "url": "https://vuldb.com/?id.309504",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.580167", "url": "https://vuldb.com/?submit.580167",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-4947",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2025-05-28T07:15:24.780",
"lastModified": "2025-05-28T07:15:24.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://curl.se/docs/CVE-2025-4947.html",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://curl.se/docs/CVE-2025-4947.json",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://hackerone.com/reports/3150884",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5002", "id": "CVE-2025-5002",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T22:15:19.410", "published": "2025-05-20T22:15:19.410",
"lastModified": "2025-05-21T20:24:58.133", "lastModified": "2025-05-28T01:25:25.310",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE80DE6-C79F-452F-9523-4EC1F9777DA4"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/laifeng-boy/cve/issues/5", "url": "https://github.com/laifeng-boy/cve/issues/5",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309657", "url": "https://vuldb.com/?ctiid.309657",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309657", "url": "https://vuldb.com/?id.309657",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.580192", "url": "https://vuldb.com/?submit.580192",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.sourcecodester.com/", "url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/laifeng-boy/cve/issues/5", "url": "https://github.com/laifeng-boy/cve/issues/5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5003", "id": "CVE-2025-5003",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T22:15:19.600", "published": "2025-05-20T22:15:19.600",
"lastModified": "2025-05-21T20:24:58.133", "lastModified": "2025-05-28T01:24:21.800",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,28 +142,78 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/huangyi234/CVE/issues/4", "url": "https://github.com/huangyi234/CVE/issues/4",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309658", "url": "https://vuldb.com/?ctiid.309658",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309658", "url": "https://vuldb.com/?id.309658",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.580195", "url": "https://vuldb.com/?submit.580195",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
}, },
{ {
"url": "https://github.com/huangyi234/CVE/issues/4", "url": "https://github.com/huangyi234/CVE/issues/4",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5004", "id": "CVE-2025-5004",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:19.530", "published": "2025-05-20T23:15:19.530",
"lastModified": "2025-05-21T20:24:58.133", "lastModified": "2025-05-28T01:20:50.517",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,28 +142,77 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/huangyi234/CVE/issues/8", "url": "https://github.com/huangyi234/CVE/issues/8",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309659", "url": "https://vuldb.com/?ctiid.309659",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309659", "url": "https://vuldb.com/?id.309659",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.580201", "url": "https://vuldb.com/?submit.580201",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/huangyi234/CVE/issues/8", "url": "https://github.com/huangyi234/CVE/issues/8",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5006", "id": "CVE-2025-5006",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:19.750", "published": "2025-05-20T23:15:19.750",
"lastModified": "2025-05-21T20:24:58.133", "lastModified": "2025-05-28T01:16:17.537",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/Zhaozhizhi/CVE/issues/3", "url": "https://github.com/Zhaozhizhi/CVE/issues/3",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309660", "url": "https://vuldb.com/?ctiid.309660",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://vuldb.com/?id.309660", "url": "https://vuldb.com/?id.309660",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.580248", "url": "https://vuldb.com/?submit.580248",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.campcodes.com/", "url": "https://www.campcodes.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/Zhaozhizhi/CVE/issues/3", "url": "https://github.com/Zhaozhizhi/CVE/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5008", "id": "CVE-2025-5008",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-20T23:15:20.133", "published": "2025-05-20T23:15:20.133",
"lastModified": "2025-05-21T23:15:55.200", "lastModified": "2025-05-28T01:06:49.867",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,28 +142,77 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yugeshverma:online_time_table_generator:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D396731-BA26-4FC9-87A2-51F8B2218E02"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/hhhanxx/attack/issues/18", "url": "https://github.com/hhhanxx/attack/issues/18",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309662", "url": "https://vuldb.com/?ctiid.309662",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309662", "url": "https://vuldb.com/?id.309662",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.580412", "url": "https://vuldb.com/?submit.580412",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://github.com/hhhanxx/attack/issues/18", "url": "https://github.com/hhhanxx/attack/issues/18",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-5025",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2025-05-28T07:15:24.910",
"lastModified": "2025-05-28T07:15:24.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing."
}
],
"metrics": {},
"references": [
{
"url": "https://curl.se/docs/CVE-2025-5025.html",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://curl.se/docs/CVE-2025-5025.json",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://hackerone.com/reports/3153497",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5056", "id": "CVE-2025-5056",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-21T22:15:51.283", "published": "2025-05-21T22:15:51.283",
"lastModified": "2025-05-23T15:55:02.040", "lastModified": "2025-05-28T02:08:30.840",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/Jacob-z691/CVE/issues/1", "url": "https://github.com/Jacob-z691/CVE/issues/1",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309877", "url": "https://vuldb.com/?ctiid.309877",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309877", "url": "https://vuldb.com/?id.309877",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.581373", "url": "https://vuldb.com/?submit.581373",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.campcodes.com/", "url": "https://www.campcodes.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/Jacob-z691/CVE/issues/1", "url": "https://github.com/Jacob-z691/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5057", "id": "CVE-2025-5057",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-21T22:15:51.460", "published": "2025-05-21T22:15:51.460",
"lastModified": "2025-05-23T15:55:02.040", "lastModified": "2025-05-28T02:04:36.163",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/Jacob-z691/CVE/issues/2", "url": "https://github.com/Jacob-z691/CVE/issues/2",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309878", "url": "https://vuldb.com/?ctiid.309878",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://vuldb.com/?id.309878", "url": "https://vuldb.com/?id.309878",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.581374", "url": "https://vuldb.com/?submit.581374",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.campcodes.com/", "url": "https://www.campcodes.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/Jacob-z691/CVE/issues/2", "url": "https://github.com/Jacob-z691/CVE/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5059", "id": "CVE-2025-5059",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-21T23:15:55.683", "published": "2025-05-21T23:15:55.683",
"lastModified": "2025-05-23T15:55:02.040", "lastModified": "2025-05-28T02:02:49.230",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 1.2, "exploitabilityScore": 1.2,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-434" "value": "CWE-434"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/snkercyber/CVE/issues/3", "url": "https://github.com/snkercyber/CVE/issues/3",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309879", "url": "https://vuldb.com/?ctiid.309879",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309879", "url": "https://vuldb.com/?id.309879",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.581391", "url": "https://vuldb.com/?submit.581391",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.campcodes.com/", "url": "https://www.campcodes.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/snkercyber/CVE/issues/3", "url": "https://github.com/snkercyber/CVE/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5077", "id": "CVE-2025-5077",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T14:16:09.230", "published": "2025-05-22T14:16:09.230",
"lastModified": "2025-05-23T15:55:02.040", "lastModified": "2025-05-28T01:53:25.660",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/GeniusWang23/CVE/issues/1", "url": "https://github.com/GeniusWang23/CVE/issues/1",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309957", "url": "https://vuldb.com/?ctiid.309957",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://vuldb.com/?id.309957", "url": "https://vuldb.com/?id.309957",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.581431", "url": "https://vuldb.com/?submit.581431",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.campcodes.com/", "url": "https://www.campcodes.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/GeniusWang23/CVE/issues/1", "url": "https://github.com/GeniusWang23/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5078", "id": "CVE-2025-5078",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T14:16:09.523", "published": "2025-05-22T14:16:09.523",
"lastModified": "2025-05-23T15:55:02.040", "lastModified": "2025-05-28T01:52:35.277",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/GeniusWang23/CVE/issues/2", "url": "https://github.com/GeniusWang23/CVE/issues/2",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309958", "url": "https://vuldb.com/?ctiid.309958",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309958", "url": "https://vuldb.com/?id.309958",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.581432", "url": "https://vuldb.com/?submit.581432",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.campcodes.com/", "url": "https://www.campcodes.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/GeniusWang23/CVE/issues/2", "url": "https://github.com/GeniusWang23/CVE/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5079", "id": "CVE-2025-5079",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T15:16:06.477", "published": "2025-05-22T15:16:06.477",
"lastModified": "2025-05-23T15:55:02.040", "lastModified": "2025-05-28T01:50:48.303",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -63,7 +63,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/dico-Z/CVE/issues/1", "url": "https://github.com/dico-Z/CVE/issues/1",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309959", "url": "https://vuldb.com/?ctiid.309959",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309959", "url": "https://vuldb.com/?id.309959",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.581439", "url": "https://vuldb.com/?submit.581439",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.campcodes.com/", "url": "https://www.campcodes.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5081", "id": "CVE-2025-5081",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2025-05-22T16:15:56.697", "published": "2025-05-22T16:15:56.697",
"lastModified": "2025-05-23T15:55:02.040", "lastModified": "2025-05-28T01:49:27.430",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -63,7 +63,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:cybercafe_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76B02852-BBA6-49C7-82F9-A92F2DBFC0A5"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/wzylky/CVE/issues/1", "url": "https://github.com/wzylky/CVE/issues/1",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.309961", "url": "https://vuldb.com/?ctiid.309961",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?id.309961", "url": "https://vuldb.com/?id.309961",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://vuldb.com/?submit.582065", "url": "https://vuldb.com/?submit.582065",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.campcodes.com/", "url": "https://www.campcodes.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/wzylky/CVE/issues/1", "url": "https://github.com/wzylky/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5278", "id": "CVE-2025-5278",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2025-05-27T21:15:23.197", "published": "2025-05-27T21:15:23.197",
"lastModified": "2025-05-27T21:15:23.197", "lastModified": "2025-05-28T01:15:19.730",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "secalert@redhat.com", "source": "secalert@redhat.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
@ -38,7 +38,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "secalert@redhat.com", "source": "secalert@redhat.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -55,6 +55,10 @@
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368764",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/05/27/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
} }
] ]
} }

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-05-27T23:55:19.472504+00:00 2025-05-28T08:00:19.223224+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-05-27T23:15:21.400000+00:00 2025-05-28T07:15:24.910000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -27,27 +27,23 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain ```plain
2025-05-27T00:00:04.320074+00:00 2025-05-28T00:00:04.313451+00:00
``` ```
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
295654 295670
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `8` Recently added CVEs: `4`
- [CVE-2022-21150](CVE-2022/CVE-2022-211xx/CVE-2022-21150.json) (`2025-05-27T23:15:19.840`) - [CVE-2025-4009](CVE-2025/CVE-2025-40xx/CVE-2025-4009.json) (`2025-05-28T07:15:24.490`)
- [CVE-2022-21200](CVE-2022/CVE-2022-212xx/CVE-2022-21200.json) (`2025-05-27T23:15:20.490`) - [CVE-2025-4800](CVE-2025/CVE-2025-48xx/CVE-2025-4800.json) (`2025-05-28T06:15:22.000`)
- [CVE-2024-11185](CVE-2024/CVE-2024-111xx/CVE-2024-11185.json) (`2025-05-27T23:15:20.580`) - [CVE-2025-4947](CVE-2025/CVE-2025-49xx/CVE-2025-4947.json) (`2025-05-28T07:15:24.780`)
- [CVE-2024-45094](CVE-2024/CVE-2024-450xx/CVE-2024-45094.json) (`2025-05-27T23:15:21.093`) - [CVE-2025-5025](CVE-2025/CVE-2025-50xx/CVE-2025-5025.json) (`2025-05-28T07:15:24.910`)
- [CVE-2025-2796](CVE-2025/CVE-2025-27xx/CVE-2025-2796.json) (`2025-05-27T23:15:21.283`)
- [CVE-2025-2826](CVE-2025/CVE-2025-28xx/CVE-2025-2826.json) (`2025-05-27T23:15:21.400`)
- [CVE-2025-32440](CVE-2025/CVE-2025-324xx/CVE-2025-32440.json) (`2025-05-27T22:15:21.980`)
- [CVE-2025-40911](CVE-2025/CVE-2025-409xx/CVE-2025-40911.json) (`2025-05-27T22:15:22.337`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit

View File

@ -190949,7 +190949,7 @@ CVE-2022-21147,0,0,53d42dff0ef971348abcbc9db3dccf42503f1205f0d61cae322fa8f9ff752
CVE-2022-21148,0,0,b4c937e47978f11ca1e16a1b6d1e86246877646fa0a67f66ccb9ef23bf990279,2025-05-05T17:17:39.760000 CVE-2022-21148,0,0,b4c937e47978f11ca1e16a1b6d1e86246877646fa0a67f66ccb9ef23bf990279,2025-05-05T17:17:39.760000
CVE-2022-21149,0,0,f3ae7567f3163786b900eb1a79db504939c5f01724410c388a986c59598624bd,2024-11-21T06:43:59.437000 CVE-2022-21149,0,0,f3ae7567f3163786b900eb1a79db504939c5f01724410c388a986c59598624bd,2024-11-21T06:43:59.437000
CVE-2022-2115,0,0,3b0bfd60b400c603906316aedf310160bb240d4946ebcce85d7d85bb339ae37f,2024-11-21T07:00:20.630000 CVE-2022-2115,0,0,3b0bfd60b400c603906316aedf310160bb240d4946ebcce85d7d85bb339ae37f,2024-11-21T07:00:20.630000
CVE-2022-21150,1,1,73af99be2ef6a1ec107afd973e876751c4cf1c849a91a5dd04fc97fab1a97ff6,2025-05-27T23:15:19.840000 CVE-2022-21150,0,0,73af99be2ef6a1ec107afd973e876751c4cf1c849a91a5dd04fc97fab1a97ff6,2025-05-27T23:15:19.840000
CVE-2022-21151,0,0,93b633642443edbb9a618ccace777742cd46371866dc45008734687fd210c4dd,2025-05-05T17:17:40 CVE-2022-21151,0,0,93b633642443edbb9a618ccace777742cd46371866dc45008734687fd210c4dd,2025-05-05T17:17:40
CVE-2022-21152,0,0,b6f1363434b71ccba44723b7c847dbfe5b198e98e7a674346d2e8d4b0c919e50,2025-05-05T17:17:40.817000 CVE-2022-21152,0,0,b6f1363434b71ccba44723b7c847dbfe5b198e98e7a674346d2e8d4b0c919e50,2025-05-05T17:17:40.817000
CVE-2022-21153,0,0,e312384a9ce26d515b19347cf80988cd1c5474a1f90514b58bfd29acb0034b59,2025-05-05T17:17:41.043000 CVE-2022-21153,0,0,e312384a9ce26d515b19347cf80988cd1c5474a1f90514b58bfd29acb0034b59,2025-05-05T17:17:41.043000
@ -190998,7 +190998,7 @@ CVE-2022-21197,0,0,c84dea9b93bfc978b5467cd9a739ece8f41846103bdb2c6925cfc7478a3ef
CVE-2022-21198,0,0,1155a641fdf7c6c1229127e6fa4a1cc634cfb76a3942f96e24ba77fb0ceba70d,2025-02-04T18:15:29.893000 CVE-2022-21198,0,0,1155a641fdf7c6c1229127e6fa4a1cc634cfb76a3942f96e24ba77fb0ceba70d,2025-02-04T18:15:29.893000
CVE-2022-21199,0,0,055fbcd11322cba3f7403cdce3bd9e8bbf4128df212ffbe4213a9fc5a19eef15,2024-11-21T06:44:05.567000 CVE-2022-21199,0,0,055fbcd11322cba3f7403cdce3bd9e8bbf4128df212ffbe4213a9fc5a19eef15,2024-11-21T06:44:05.567000
CVE-2022-2120,0,0,91491aa789c8d3e8f5740c6d2ca2cda651b114390fe24ccd573921c535e94c1f,2024-11-21T07:00:21.197000 CVE-2022-2120,0,0,91491aa789c8d3e8f5740c6d2ca2cda651b114390fe24ccd573921c535e94c1f,2024-11-21T07:00:21.197000
CVE-2022-21200,1,1,0576b98bc61e8e27aaba7204bd609fefc4e419ef74671c40c0e5fe1246dae388,2025-05-27T23:15:20.490000 CVE-2022-21200,0,0,0576b98bc61e8e27aaba7204bd609fefc4e419ef74671c40c0e5fe1246dae388,2025-05-27T23:15:20.490000
CVE-2022-21201,0,0,a4e0197e75f2936b3b645b102670e01ddad1b696e4e752b3e65628adb198be0a,2024-11-21T06:44:05.670000 CVE-2022-21201,0,0,a4e0197e75f2936b3b645b102670e01ddad1b696e4e752b3e65628adb198be0a,2024-11-21T06:44:05.670000
CVE-2022-21202,0,0,de1464aa17fa964c60b8c29cf8a7e5dc40be4a6ba7d04f8662a1c3aa6b2bd546,2024-11-21T06:44:05.777000 CVE-2022-21202,0,0,de1464aa17fa964c60b8c29cf8a7e5dc40be4a6ba7d04f8662a1c3aa6b2bd546,2024-11-21T06:44:05.777000
CVE-2022-21203,0,0,54568b987437a847f5d31726a301236c617930ea9392a11177e819c0241828a7,2025-05-05T17:17:43.880000 CVE-2022-21203,0,0,54568b987437a847f5d31726a301236c617930ea9392a11177e819c0241828a7,2025-05-05T17:17:43.880000
@ -233728,6 +233728,7 @@ CVE-2023-41834,0,0,fe97b040b6a12d18159971f3ffafabcd5d8334236b35f116720f5f615708a
CVE-2023-41835,0,0,ce7155b465e140a8e62b26a8d6d86203572f5bdb055ed610039eae08c9aef2e1,2024-11-21T08:21:46.180000 CVE-2023-41835,0,0,ce7155b465e140a8e62b26a8d6d86203572f5bdb055ed610039eae08c9aef2e1,2024-11-21T08:21:46.180000
CVE-2023-41836,0,0,c3f04a6ef80b01f6ac7cd2e69564f223dd13bbcf85e284392104bb6022b1b1d0,2024-11-21T08:21:46.330000 CVE-2023-41836,0,0,c3f04a6ef80b01f6ac7cd2e69564f223dd13bbcf85e284392104bb6022b1b1d0,2024-11-21T08:21:46.330000
CVE-2023-41838,0,0,952c54aae683059d62b494aadea90c0936995fec7c2c31e60fa8e87d00501e21,2024-11-21T08:21:46.483000 CVE-2023-41838,0,0,952c54aae683059d62b494aadea90c0936995fec7c2c31e60fa8e87d00501e21,2024-11-21T08:21:46.483000
CVE-2023-41839,0,0,7c22c7560745c0193919f9882c2fff0f3a5a0bd9a40ff759ac0ae75da9136afe,2025-05-28T04:15:31.777000
CVE-2023-4184,0,0,60df463ab72975bdd1bf87dea9d6116251117803b12f9222b99bf19e9331ed2f,2024-11-21T08:34:34.303000 CVE-2023-4184,0,0,60df463ab72975bdd1bf87dea9d6116251117803b12f9222b99bf19e9331ed2f,2024-11-21T08:34:34.303000
CVE-2023-41840,0,0,8d20f8abe065bcbe2c2d718ad7ceafc29f0c9c2f78c1e082d11032e68d2148f8,2024-11-21T08:21:46.637000 CVE-2023-41840,0,0,8d20f8abe065bcbe2c2d718ad7ceafc29f0c9c2f78c1e082d11032e68d2148f8,2024-11-21T08:21:46.637000
CVE-2023-41841,0,0,491f8782f84ae4bdd0c119a57acc5dfb8b3c40fff6f6761c378b72c883787aec,2024-11-21T08:21:46.777000 CVE-2023-41841,0,0,491f8782f84ae4bdd0c119a57acc5dfb8b3c40fff6f6761c378b72c883787aec,2024-11-21T08:21:46.777000
@ -246093,7 +246094,7 @@ CVE-2024-11181,0,0,a6b77044e6509fe3aca0bf2fdf8735020e45d95ff8f1e77d85c770a6e50da
CVE-2024-11182,0,0,fcbf84d76bd0ec5a6be96e0f2f3367a28021db9502432aff67df27ded6f18f2e,2025-05-21T18:44:12.623000 CVE-2024-11182,0,0,fcbf84d76bd0ec5a6be96e0f2f3367a28021db9502432aff67df27ded6f18f2e,2025-05-21T18:44:12.623000
CVE-2024-11183,0,0,38a79fdf028e6d076b0c9ce59b96b7c75f295dd059f7e0b8602ad289d643763d,2025-05-06T21:25:00.510000 CVE-2024-11183,0,0,38a79fdf028e6d076b0c9ce59b96b7c75f295dd059f7e0b8602ad289d643763d,2025-05-06T21:25:00.510000
CVE-2024-11184,0,0,95b60c199ec8feaed7403cfeaeb615c0adf5827564743c751fc62910137c62e9,2025-01-06T21:15:13.693000 CVE-2024-11184,0,0,95b60c199ec8feaed7403cfeaeb615c0adf5827564743c751fc62910137c62e9,2025-01-06T21:15:13.693000
CVE-2024-11185,1,1,c6a17314ee52960d01f698ab8cdbbaad5a9c6a5fb6b7f626a2200ccec27553af,2025-05-27T23:15:20.580000 CVE-2024-11185,0,0,c6a17314ee52960d01f698ab8cdbbaad5a9c6a5fb6b7f626a2200ccec27553af,2025-05-27T23:15:20.580000
CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000 CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000
CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000 CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000
CVE-2024-11188,0,0,8070c22ab1552d28f4790f36fbb035b9ddec6883502131d83e84861dfa7e75e7,2024-11-23T06:15:17.570000 CVE-2024-11188,0,0,8070c22ab1552d28f4790f36fbb035b9ddec6883502131d83e84861dfa7e75e7,2024-11-23T06:15:17.570000
@ -262550,7 +262551,7 @@ CVE-2024-36681,0,0,96c1846f583101f7866c8fadfdf3a33b81ffcf4e96d0387c413dba15329c6
CVE-2024-36682,0,0,cb2995f0242062cfca7bdf65500013048768a2b6d65b1c25e30172054d0e0139,2024-11-21T09:22:32.397000 CVE-2024-36682,0,0,cb2995f0242062cfca7bdf65500013048768a2b6d65b1c25e30172054d0e0139,2024-11-21T09:22:32.397000
CVE-2024-36683,0,0,be595454ef8171db03a002d73c28446849c4fd224f6bc90a988dfe37de330fdc,2024-11-21T09:22:32.600000 CVE-2024-36683,0,0,be595454ef8171db03a002d73c28446849c4fd224f6bc90a988dfe37de330fdc,2024-11-21T09:22:32.600000
CVE-2024-36684,0,0,8fab043b3364ae1eeedff575a1f0cbfbc03fa998f9cc28dd8bada425bf4a8acf,2024-11-21T09:22:32.807000 CVE-2024-36684,0,0,8fab043b3364ae1eeedff575a1f0cbfbc03fa998f9cc28dd8bada425bf4a8acf,2024-11-21T09:22:32.807000
CVE-2024-3669,0,0,48e93d834169209b4a3103f1fa3909fb6e7a831db81a3ba76b06d37b3e787c9a,2024-11-21T09:30:08.690000 CVE-2024-3669,0,0,bf0d428440354671ae9f717d945ef28e9e393ce50c7ad5fdcc16412f8b06faf2,2025-05-28T00:54:09.360000
CVE-2024-36691,0,0,3dfc8ca2b0f56703968ad393c59292478596f8672b0393464c33aed3c63780aa,2024-11-21T09:22:33.040000 CVE-2024-36691,0,0,3dfc8ca2b0f56703968ad393c59292478596f8672b0393464c33aed3c63780aa,2024-11-21T09:22:33.040000
CVE-2024-36694,0,0,97e39bbb6c67fa2d3fcd0bc2d169d009680f66af761bc61f98a7f5a4b2e194ab,2025-04-22T15:36:02.527000 CVE-2024-36694,0,0,97e39bbb6c67fa2d3fcd0bc2d169d009680f66af761bc61f98a7f5a4b2e194ab,2025-04-22T15:36:02.527000
CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000 CVE-2024-36699,0,0,f519eb157e638490c5e16aa33d3cf222cb0f0828212475d05c477400a1f8b777,2024-06-14T15:15:50.967000
@ -265857,7 +265858,7 @@ CVE-2024-40956,0,0,f35dc66c569773537c41655b5b868e59e721e8f7ff6809d21084628e699c0
CVE-2024-40957,0,0,8c88dfffe800e3d85344951840f64f97a55eebeb79655fdcb09982a38c3f76d5,2024-11-21T09:31:56.810000 CVE-2024-40957,0,0,8c88dfffe800e3d85344951840f64f97a55eebeb79655fdcb09982a38c3f76d5,2024-11-21T09:31:56.810000
CVE-2024-40958,0,0,7495d58e5b81955176212788f60f87330a2e9c6bce5c3dd26de405b05b1f6533,2024-11-21T09:31:56.947000 CVE-2024-40958,0,0,7495d58e5b81955176212788f60f87330a2e9c6bce5c3dd26de405b05b1f6533,2024-11-21T09:31:56.947000
CVE-2024-40959,0,0,0043be57531474631cc6de7737512d2ab0230deb9269189d29b950369a0fd17c,2024-11-21T09:31:57.090000 CVE-2024-40959,0,0,0043be57531474631cc6de7737512d2ab0230deb9269189d29b950369a0fd17c,2024-11-21T09:31:57.090000
CVE-2024-4096,0,0,8de4935f6098b6eef1effebea5690d7854065723072ff76e21cbe24e62d668df,2024-11-21T09:42:11.190000 CVE-2024-4096,0,0,a6100502a92d8a5a161d019b647bc5dcd282882af1f3f803f74e649aaeea854a,2025-05-28T00:52:03.347000
CVE-2024-40960,0,0,d1b260bce7a6f4e3918591cefa3fd644d2061253ecfc0dec1722a192d1703af2,2024-11-21T09:31:57.263000 CVE-2024-40960,0,0,d1b260bce7a6f4e3918591cefa3fd644d2061253ecfc0dec1722a192d1703af2,2024-11-21T09:31:57.263000
CVE-2024-40961,0,0,c323f131dac03e8f3736a795ce92c772336b6ee895d5ed1507aa424851c01204,2024-11-21T09:31:57.413000 CVE-2024-40961,0,0,c323f131dac03e8f3736a795ce92c772336b6ee895d5ed1507aa424851c01204,2024-11-21T09:31:57.413000
CVE-2024-40962,0,0,1b32e5be99ff36031e51ef4af62c32f3376ebee25aa8774ef70b4bd4ef137e55,2025-01-07T16:10:10.253000 CVE-2024-40962,0,0,1b32e5be99ff36031e51ef4af62c32f3376ebee25aa8774ef70b4bd4ef137e55,2025-01-07T16:10:10.253000
@ -269051,7 +269052,7 @@ CVE-2024-45088,0,0,1beec48fbebe975f8bc73123f865d04a7ed8df665a2d4af27f0cdfaad4366
CVE-2024-45089,0,0,542dfbf973be63b03ff718a4f3a8fab91d5b396d4bcab48b662c4f8c45834b4d,2025-03-05T18:26:20.030000 CVE-2024-45089,0,0,542dfbf973be63b03ff718a4f3a8fab91d5b396d4bcab48b662c4f8c45834b4d,2025-03-05T18:26:20.030000
CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000 CVE-2024-4509,0,0,3524d641cd000812a310ff38fb9e15060d273c22d6c74437283905e2f7ceb2a8,2024-11-21T09:42:59.127000
CVE-2024-45091,0,0,15b0a69c48e3ad122ef5c06eab93e452421cc3bec77edca18bcd67201ac2adaa,2025-01-29T21:12:41.107000 CVE-2024-45091,0,0,15b0a69c48e3ad122ef5c06eab93e452421cc3bec77edca18bcd67201ac2adaa,2025-01-29T21:12:41.107000
CVE-2024-45094,1,1,eac2452d1432b4c60a27953b2742ccdca4fbe302b18c5bcd9565d7950844128a,2025-05-27T23:15:21.093000 CVE-2024-45094,0,0,eac2452d1432b4c60a27953b2742ccdca4fbe302b18c5bcd9565d7950844128a,2025-05-27T23:15:21.093000
CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000 CVE-2024-45096,0,0,6e04e4dc0b5cb194770300a49e24b05d1a72a2bb58de4b452fabe27ca897f070,2024-09-06T12:34:17.957000
CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eeaa37,2024-09-06T12:51:59.750000 CVE-2024-45097,0,0,86a5f6f58b36ff4d76801faef73b7a44c24bdd910aa639853fe61c2940eeaa37,2024-09-06T12:51:59.750000
CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000 CVE-2024-45098,0,0,beeee876795e27e2a560d9e6400141cf489497a78fea87df6979a5ea96e1eb85,2024-09-06T13:01:44.023000
@ -271610,7 +271611,7 @@ CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7
CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000 CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000
CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000 CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000
CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000 CVE-2024-48700,0,0,01c4f559aaf90a38c82d132f177d7376c563e831acc8fed72ee735b60694278e,2024-10-29T19:35:24.643000
CVE-2024-48702,0,0,307b904a666af6813868acd076c344b88453ac52a59c26a56b076304996e11e6,2025-05-23T15:54:42.643000 CVE-2024-48702,0,0,01ea8d7d8d70b95471496eea8001e6b5bc98a75e9594313b9cf5383c4cf9d75b,2025-05-28T01:40:19.143000
CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000 CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4b79,2024-12-11T17:15:16.880000
CVE-2024-48704,0,0,3893d860c5cbcfcb221edb7b511c8425d1a2b0fa61906308ba9350b2db11e150,2025-05-23T16:15:24.403000 CVE-2024-48704,0,0,3893d860c5cbcfcb221edb7b511c8425d1a2b0fa61906308ba9350b2db11e150,2025-05-23T16:15:24.403000
CVE-2024-48706,0,0,c943b13c3a3939cb5d8b86b065bc2ddde43d7d1c2b6d276f98ff2b2d6bbb9294,2025-03-25T17:16:11.580000 CVE-2024-48706,0,0,c943b13c3a3939cb5d8b86b065bc2ddde43d7d1c2b6d276f98ff2b2d6bbb9294,2025-03-25T17:16:11.580000
@ -273566,12 +273567,12 @@ CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c
CVE-2024-51094,0,0,428eba4d2b25aa4f0722ef2b3d4daef54792a17342b2b8a3a1bd37dc73e6ba77,2025-05-22T17:28:00.107000 CVE-2024-51094,0,0,428eba4d2b25aa4f0722ef2b3d4daef54792a17342b2b8a3a1bd37dc73e6ba77,2025-05-22T17:28:00.107000
CVE-2024-51099,0,0,76299d701a4a326304643950fc6a06063189d1cf898039e5e4a1de0b1cac5f1f,2025-05-23T16:15:24.527000 CVE-2024-51099,0,0,76299d701a4a326304643950fc6a06063189d1cf898039e5e4a1de0b1cac5f1f,2025-05-23T16:15:24.527000
CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000 CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000
CVE-2024-51101,0,0,fec8dd28bebab4662ba2a4d707a6d12c68a1d678f538f5ab886249855c7a1999,2025-05-23T15:54:42.643000 CVE-2024-51101,0,0,e4d47c0080321b806c8f657e0373e6db1fc5c5309326af02b3039c69f02cb6f9,2025-05-28T01:42:23.560000
CVE-2024-51102,0,0,97831955bfdf9790880422aa6ef84b830a8bb4e25861ffcd032c1ac1a29b89ef,2025-05-23T19:15:21.220000 CVE-2024-51102,0,0,97831955bfdf9790880422aa6ef84b830a8bb4e25861ffcd032c1ac1a29b89ef,2025-05-23T19:15:21.220000
CVE-2024-51103,0,0,f4b83b954d67fa14dd00f188cb7911f528eb31c3009429b0a9d4991a04725b3d,2025-05-23T16:15:24.643000 CVE-2024-51103,0,0,f4b83b954d67fa14dd00f188cb7911f528eb31c3009429b0a9d4991a04725b3d,2025-05-23T16:15:24.643000
CVE-2024-51106,0,0,b4f066c6258fb1ca79f53921624ad8ee81faf462bcf70c6ebe65131d490bc5b7,2025-05-21T20:25:33.823000 CVE-2024-51106,0,0,52316175fd89c5253300b2e14d9e26b21a88903277d9d4c00394f347fe89ca33,2025-05-28T01:00:45.410000
CVE-2024-51107,0,0,d688abae21c988868a73bc1ff17121c383b72a833d19b71da23855711720f40e,2025-05-23T15:54:42.643000 CVE-2024-51107,0,0,cbf01b3eee34c7b5a0cd560312505110cfa6f6be423a19b9a60a07d3542da8c4,2025-05-28T01:44:54.320000
CVE-2024-51108,0,0,40947e231ab684dad8551f526deae7e614b95f3363b2d658df8b035009d3076b,2025-05-23T15:54:42.643000 CVE-2024-51108,0,0,70e9fc6e5f619b67ea5feb94e2f056d89d4c926a188193efb96358eb6c910327,2025-05-28T01:44:07.960000
CVE-2024-5111,0,0,afdc374c63208154122a1e480b379bf8aece87015a21eb603ff3e335d14b6fef,2025-02-21T20:09:47.700000 CVE-2024-5111,0,0,afdc374c63208154122a1e480b379bf8aece87015a21eb603ff3e335d14b6fef,2025-02-21T20:09:47.700000
CVE-2024-51111,0,0,1b60f534839740b969e5474b088b0887cce9ab6321e3570e84fbd1d3290a378d,2025-01-06T18:15:20.060000 CVE-2024-51111,0,0,1b60f534839740b969e5474b088b0887cce9ab6321e3570e84fbd1d3290a378d,2025-01-06T18:15:20.060000
CVE-2024-51112,0,0,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000 CVE-2024-51112,0,0,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000
@ -277806,7 +277807,7 @@ CVE-2024-57646,0,0,a888cdd5365c2b8dea460aeb56378a7623ae682bc07a8d0f9dec38273c362
CVE-2024-57647,0,0,d3984558393252e3df3fb667ed5c80aa1b991a2d6bc9d98908f75cf9cd4397fa,2025-04-17T16:47:19.220000 CVE-2024-57647,0,0,d3984558393252e3df3fb667ed5c80aa1b991a2d6bc9d98908f75cf9cd4397fa,2025-04-17T16:47:19.220000
CVE-2024-57648,0,0,b7c7dc7ebc32322874d38b1745b034b539148709438f93be252e21212efcaa79,2025-04-17T16:47:16.813000 CVE-2024-57648,0,0,b7c7dc7ebc32322874d38b1745b034b539148709438f93be252e21212efcaa79,2025-04-17T16:47:16.813000
CVE-2024-57649,0,0,a90ba56c8166c25edf0ef2f87243dc95641782e6dd10bd8cd0ce7bb7dd78c660,2025-04-17T16:47:14.280000 CVE-2024-57649,0,0,a90ba56c8166c25edf0ef2f87243dc95641782e6dd10bd8cd0ce7bb7dd78c660,2025-04-17T16:47:14.280000
CVE-2024-5765,0,0,8bc2294d6d7af965be603f90c65d8cabf573a7f7fa01fb8de5ef7a7fb2539707,2024-11-21T09:48:18.090000 CVE-2024-5765,0,0,92c5d8c017efa62598245e2a40eb941bba381c9d8565f04d08f00539e71e0cb2,2025-05-28T00:51:15.270000
CVE-2024-57650,0,0,d5ed05d0d2ef6d6244f24ea302a427ad0877aa33635ccb941889bd4ce3686559,2025-04-17T16:47:11.903000 CVE-2024-57650,0,0,d5ed05d0d2ef6d6244f24ea302a427ad0877aa33635ccb941889bd4ce3686559,2025-04-17T16:47:11.903000
CVE-2024-57651,0,0,62b1065be744d99f48fea1a3e7658cb0a92f791d0c8c9d29d94c4ab0ff0cc35a,2025-04-17T16:47:08.997000 CVE-2024-57651,0,0,62b1065be744d99f48fea1a3e7658cb0a92f791d0c8c9d29d94c4ab0ff0cc35a,2025-04-17T16:47:08.997000
CVE-2024-57652,0,0,8f20d5782dd9506a7196df3ec7850b57fabff337caf79c5adae6fcd0cd231a9e,2025-04-17T16:47:05.030000 CVE-2024-57652,0,0,8f20d5782dd9506a7196df3ec7850b57fabff337caf79c5adae6fcd0cd231a9e,2025-04-17T16:47:05.030000
@ -278127,7 +278128,7 @@ CVE-2024-58066,0,0,c6e3b768d006a4e502266d5440a1292003cf4ce5373a8e00bedbdf635b758
CVE-2024-58067,0,0,539fcaa5844135d8382de5294a58afb3d718ddb2522286dde14d2eb07f695970,2025-03-25T14:44:00.237000 CVE-2024-58067,0,0,539fcaa5844135d8382de5294a58afb3d718ddb2522286dde14d2eb07f695970,2025-03-25T14:44:00.237000
CVE-2024-58068,0,0,c4222890e8d1bb8a6fd55e01d09dd9d69c7567be1d440d26b5a5d79630a65f7d,2025-03-25T14:47:07.467000 CVE-2024-58068,0,0,c4222890e8d1bb8a6fd55e01d09dd9d69c7567be1d440d26b5a5d79630a65f7d,2025-03-25T14:47:07.467000
CVE-2024-58069,0,0,e74d8cad603e1620e828d4b3caac6e0ceb942144c73e5c456889b854714ef962,2025-03-25T14:48:40.760000 CVE-2024-58069,0,0,e74d8cad603e1620e828d4b3caac6e0ceb942144c73e5c456889b854714ef962,2025-03-25T14:48:40.760000
CVE-2024-5807,0,0,e39b8ad5e228368927b79aa56a54eaa43f3eaa14a89129cbf854c403a97f91d8,2024-11-21T09:48:22.057000 CVE-2024-5807,0,0,d4be4262d40bde5347e31b02a8283ace048206bfcacb514bc578a69101017b51,2025-05-28T00:50:36.617000
CVE-2024-58070,0,0,9c89d9904014e5d004d59e1f69fe53f6a2ec8e42ab0e66d5da1feebbb233b551,2025-03-25T14:21:57.697000 CVE-2024-58070,0,0,9c89d9904014e5d004d59e1f69fe53f6a2ec8e42ab0e66d5da1feebbb233b551,2025-03-25T14:21:57.697000
CVE-2024-58071,0,0,aab391a33ed2ebaff184b9ec4086049e627ecb3ac5f43dfc6d2aa871d74b66dc,2025-03-25T14:22:11.633000 CVE-2024-58071,0,0,aab391a33ed2ebaff184b9ec4086049e627ecb3ac5f43dfc6d2aa871d74b66dc,2025-03-25T14:22:11.633000
CVE-2024-58072,0,0,d52e0da3f5c91d03028994ae6c07bb11e0728d624ff7bdc5d9ccc3a65443e2c9,2025-03-13T13:15:45.920000 CVE-2024-58072,0,0,d52e0da3f5c91d03028994ae6c07bb11e0728d624ff7bdc5d9ccc3a65443e2c9,2025-03-13T13:15:45.920000
@ -278138,7 +278139,7 @@ CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a1
CVE-2024-58077,0,0,f3ec17f492afe830e4bdffec9ee6935e46e28e5e78af48de044da0a78231897b,2025-03-06T17:15:21.123000 CVE-2024-58077,0,0,f3ec17f492afe830e4bdffec9ee6935e46e28e5e78af48de044da0a78231897b,2025-03-06T17:15:21.123000
CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000 CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000
CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000 CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000
CVE-2024-5808,0,0,5a73a5618425d1f2d9eaf1f173cdff3fa455743e0b010bcc63eccd6f6e0c1652,2024-11-21T09:48:22.213000 CVE-2024-5808,0,0,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000
CVE-2024-58080,0,0,e3835bb895176f76b9629f1f45e7a50098fa6dc90a8d8933f702379f8bdec271,2025-03-25T14:27:18.737000 CVE-2024-58080,0,0,e3835bb895176f76b9629f1f45e7a50098fa6dc90a8d8933f702379f8bdec271,2025-03-25T14:27:18.737000
CVE-2024-58081,0,0,d14fd97d756a1cf5956e0eb5be64ade4f19b40adbeb5fcfa6440435351f38eb0,2025-03-25T14:27:38.820000 CVE-2024-58081,0,0,d14fd97d756a1cf5956e0eb5be64ade4f19b40adbeb5fcfa6440435351f38eb0,2025-03-25T14:27:38.820000
CVE-2024-58082,0,0,2224c338aeba3c6f1f3d7b825286f63e7ba1be753f0574b81f01302121977acc,2025-03-06T17:15:21.677000 CVE-2024-58082,0,0,2224c338aeba3c6f1f3d7b825286f63e7ba1be753f0574b81f01302121977acc,2025-03-06T17:15:21.677000
@ -278149,7 +278150,7 @@ CVE-2024-58086,0,0,f1395b9bc6450b1446434126a0cdece082421cfdb9c768edd21ee2aefff1d
CVE-2024-58087,0,0,04a36bf48b3a2cdfea7da85ab1709b6a14fc57278f19e47877c4e4a8b19d5d33,2025-03-13T16:22:01.067000 CVE-2024-58087,0,0,04a36bf48b3a2cdfea7da85ab1709b6a14fc57278f19e47877c4e4a8b19d5d33,2025-03-13T16:22:01.067000
CVE-2024-58088,0,0,548028057d678538b0d3a9c3c915640aea1986564c6a81f45d90000c55bd6831,2025-03-13T16:21:33.877000 CVE-2024-58088,0,0,548028057d678538b0d3a9c3c915640aea1986564c6a81f45d90000c55bd6831,2025-03-13T16:21:33.877000
CVE-2024-58089,0,0,c539e21863bf6d808e8f03e17c4063f4cf474cdca947eadd829ab37d0ca02025,2025-03-13T16:21:17.030000 CVE-2024-58089,0,0,c539e21863bf6d808e8f03e17c4063f4cf474cdca947eadd829ab37d0ca02025,2025-03-13T16:21:17.030000
CVE-2024-5809,0,0,0a5bf6a9d99e27af5b5a00b47f9d494997d7ec310ddf537ead1dec78e82e93bd,2024-11-21T09:48:22.387000 CVE-2024-5809,0,0,c4b8b59104f068ec24124c9d818f6d627fb564dbf53494b008a39765c54f9477,2025-05-28T00:46:20.463000
CVE-2024-58090,0,0,5d5a772ef85a7d7cf1764ffd3f4d817a84bbc6475cefed9abaaa898b75cace7a,2025-03-27T16:45:12.210000 CVE-2024-58090,0,0,5d5a772ef85a7d7cf1764ffd3f4d817a84bbc6475cefed9abaaa898b75cace7a,2025-03-27T16:45:12.210000
CVE-2024-58091,0,0,bdb73265ec2113004990c5b046492ea3ca27cffddbcbc776a99f7489adfd4d1b,2025-03-27T16:45:12.210000 CVE-2024-58091,0,0,bdb73265ec2113004990c5b046492ea3ca27cffddbcbc776a99f7489adfd4d1b,2025-03-27T16:45:12.210000
CVE-2024-58092,0,0,53f31227bd07354c6c789ed76152b430dbc15e4ab3c96f0045d950ec318a2250,2025-04-16T13:25:37.340000 CVE-2024-58092,0,0,53f31227bd07354c6c789ed76152b430dbc15e4ab3c96f0045d950ec318a2250,2025-04-16T13:25:37.340000
@ -278354,7 +278355,7 @@ CVE-2024-5971,0,0,f03f53869694442f097b92cf60ccdd932b1bd24804d85a21f37d5d1a934565
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5973,0,0,5764fe7dba8a714456e598c82d1ba942598616db44809839e67ac1f6bf90f970,2024-11-21T09:48:40.297000 CVE-2024-5973,0,0,5764fe7dba8a714456e598c82d1ba942598616db44809839e67ac1f6bf90f970,2024-11-21T09:48:40.297000
CVE-2024-5974,0,0,d125bc9130d6cdb44d098f1dba162d025003a48ce6f65b23901cdc8d897e2e84,2025-01-13T18:15:19.697000 CVE-2024-5974,0,0,d125bc9130d6cdb44d098f1dba162d025003a48ce6f65b23901cdc8d897e2e84,2025-01-13T18:15:19.697000
CVE-2024-5975,0,0,1540d9cf16be3cdaab49810d2c22343710e6ed2f67972005f1fcea70f1fac8ea,2024-11-21T09:48:40.623000 CVE-2024-5975,0,0,3be3b53e1dab5331d0640ddf4a1f3b483a49f7699ffb58531a66efe441ae4f11,2025-05-28T00:42:32.570000
CVE-2024-5976,0,0,87c7e0aaf6cd0dcd3015a44e98f6c6317c749221800441ee90e6991faaa5d21d,2024-11-21T09:48:40.793000 CVE-2024-5976,0,0,87c7e0aaf6cd0dcd3015a44e98f6c6317c749221800441ee90e6991faaa5d21d,2024-11-21T09:48:40.793000
CVE-2024-5977,0,0,909876bcbf4f2ad2839dc39ff9f402926337af028be37025b6a8c86d94af7f35,2024-11-21T09:48:40.960000 CVE-2024-5977,0,0,909876bcbf4f2ad2839dc39ff9f402926337af028be37025b6a8c86d94af7f35,2024-11-21T09:48:40.960000
CVE-2024-5979,0,0,af718dd6f9c3a56a817df80eecdb8156b18063e36e493393439a223ddf585359,2024-11-21T09:48:41.093000 CVE-2024-5979,0,0,af718dd6f9c3a56a817df80eecdb8156b18063e36e493393439a223ddf585359,2024-11-21T09:48:41.093000
@ -287568,6 +287569,9 @@ CVE-2025-25014,0,0,647104a2327be5f1c7c985c2226368a66da33abeea590fea277f963925352
CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000 CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000
CVE-2025-25016,0,0,d83ceddcf1bcf084cd4544ad95cf9a19b953e3c151e0441bc0e4520196c8ad1f,2025-05-02T13:53:20.943000 CVE-2025-25016,0,0,d83ceddcf1bcf084cd4544ad95cf9a19b953e3c151e0441bc0e4520196c8ad1f,2025-05-02T13:53:20.943000
CVE-2025-25023,0,0,074c065f09189eb031ac585458a2e1d09aaf15c120a072909abd4feb5fd42f37,2025-04-09T20:02:41.860000 CVE-2025-25023,0,0,074c065f09189eb031ac585458a2e1d09aaf15c120a072909abd4feb5fd42f37,2025-04-09T20:02:41.860000
CVE-2025-25025,0,0,51175f6f6820fc5f851da04a28029425565c96ca40249a30897b9927e1fa4df9,2025-05-28T02:15:20.417000
CVE-2025-25026,0,0,913a89931cf7d794e2984ce9c9070908f3ccbf7de7cf875dcc9a0cac87fa616c,2025-05-28T02:15:20.583000
CVE-2025-25029,0,0,070306c6d189398d41fa68d33581165f5e9fc679fe550088a4029ab8b935844e,2025-05-28T02:15:20.753000
CVE-2025-25035,0,0,4a2d0f672ce0e83b98c92e972e5b7eb6fa5e15f13c5c1cb0d71f8aaf6e12e24b,2025-03-21T19:15:45.437000 CVE-2025-25035,0,0,4a2d0f672ce0e83b98c92e972e5b7eb6fa5e15f13c5c1cb0d71f8aaf6e12e24b,2025-03-21T19:15:45.437000
CVE-2025-25036,0,0,a8799abf886f32cf74fa3727668b9ee2d7cf5c4f840bf1724d07c64c2d8a39a5,2025-03-21T20:15:15.293000 CVE-2025-25036,0,0,a8799abf886f32cf74fa3727668b9ee2d7cf5c4f840bf1724d07c64c2d8a39a5,2025-03-21T20:15:15.293000
CVE-2025-25039,0,0,6155e71068b69a4630ff4049b1126cd719aacb06ed44ea56a73c6de4d42c8922,2025-03-28T17:37:36.690000 CVE-2025-25039,0,0,6155e71068b69a4630ff4049b1126cd719aacb06ed44ea56a73c6de4d42c8922,2025-03-28T17:37:36.690000
@ -289357,7 +289361,7 @@ CVE-2025-27937,0,0,46e59abc87395fad933022253638fee740418314c08fa44c43852bb835ed4
CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000 CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000
CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000 CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000
CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000 CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000
CVE-2025-2796,1,1,0fbb630e2abe61aade417421e28e8d980bbaee928d1afe4ed72e70bd3970f2ae,2025-05-27T23:15:21.283000 CVE-2025-2796,0,0,0fbb630e2abe61aade417421e28e8d980bbaee928d1afe4ed72e70bd3970f2ae,2025-05-27T23:15:21.283000
CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000 CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000
CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000 CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000
CVE-2025-27980,0,0,d2f5f5ebada616a2bc11216168eecc9bced7938b2c036a22eb2533c1949980c8,2025-05-22T15:53:24.823000 CVE-2025-27980,0,0,d2f5f5ebada616a2bc11216168eecc9bced7938b2c036a22eb2533c1949980c8,2025-05-22T15:53:24.823000
@ -289470,7 +289474,7 @@ CVE-2025-2825,0,0,e4db2ec87b94dcda703a7cb29d9641a787a1d84d05d6f964d3ea9c8b54dfc7
CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000 CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000
CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18 CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18
CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000 CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
CVE-2025-2826,1,1,cde927b828c92118110a503a691e114965c68db4bf88b439a0626463e4906f70,2025-05-27T23:15:21.400000 CVE-2025-2826,0,0,cde927b828c92118110a503a691e114965c68db4bf88b439a0626463e4906f70,2025-05-27T23:15:21.400000
CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000 CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000
CVE-2025-2830,0,0,18f5acbcc1908730340a8cc830c427c3344653036d2c90e6b125301c8343cff5,2025-04-15T19:16:07.927000 CVE-2025-2830,0,0,18f5acbcc1908730340a8cc830c427c3344653036d2c90e6b125301c8343cff5,2025-04-15T19:16:07.927000
CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000 CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000
@ -291905,7 +291909,7 @@ CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000 CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000 CVE-2025-32439,0,0,bc2ffe14216b9cfe29b31e6fc5be13f4870b9bbc8f43f42b1dd5fa85872b2005,2025-04-16T13:25:59.640000
CVE-2025-3244,0,0,83385a875e2316aa8147e21cd040f4a5fd2ca8ba35219f944564cb0a256174d9,2025-05-14T21:07:17.220000 CVE-2025-3244,0,0,83385a875e2316aa8147e21cd040f4a5fd2ca8ba35219f944564cb0a256174d9,2025-05-14T21:07:17.220000
CVE-2025-32440,1,1,7687ef0eb2c76bab0ab5f35300721a80b41ea3da13903bdea0b6cb12719c2349,2025-05-27T22:15:21.980000 CVE-2025-32440,0,0,7687ef0eb2c76bab0ab5f35300721a80b41ea3da13903bdea0b6cb12719c2349,2025-05-27T22:15:21.980000
CVE-2025-32441,0,0,5d96695d99df210c451cb1297434489aa5ccf2a218059c2922743ca7b2a18209,2025-05-08T14:39:09.683000 CVE-2025-32441,0,0,5d96695d99df210c451cb1297434489aa5ccf2a218059c2922743ca7b2a18209,2025-05-08T14:39:09.683000
CVE-2025-32442,0,0,3d727ddd988064a7ed8b991fa369d7c4d417f02766d256143d6103e1f774327c,2025-04-28T18:15:48.393000 CVE-2025-32442,0,0,3d727ddd988064a7ed8b991fa369d7c4d417f02766d256143d6103e1f774327c,2025-04-28T18:15:48.393000
CVE-2025-32444,0,0,040bc0b93f2555e371bd992e022bc009bca8f15a87bedbd2890deefa7d9aa25f,2025-05-02T13:53:40.163000 CVE-2025-32444,0,0,040bc0b93f2555e371bd992e022bc009bca8f15a87bedbd2890deefa7d9aa25f,2025-05-02T13:53:40.163000
@ -292737,11 +292741,11 @@ CVE-2025-3708,0,0,d78aa125c93a2dcfe7efdd0fc06a6ffc03cde5530d4cb9fd272dabdbcad493
CVE-2025-37087,0,0,20c409449e046fc0b07333a7d65b24c67907255590b88923cb6e09a524d20ee6,2025-05-01T22:15:17.647000 CVE-2025-37087,0,0,20c409449e046fc0b07333a7d65b24c67907255590b88923cb6e09a524d20ee6,2025-05-01T22:15:17.647000
CVE-2025-37088,0,0,64ae2a894e2b0014068f1cc908ac2a8b164865977a9c111fb0dac895c15630cc,2025-04-25T15:15:36.593000 CVE-2025-37088,0,0,64ae2a894e2b0014068f1cc908ac2a8b164865977a9c111fb0dac895c15630cc,2025-04-25T15:15:36.593000
CVE-2025-3709,0,0,bd15d31f777243540548b544e8985e8a31e62890f7bf4ae13fef85062e09984a,2025-05-07T16:50:52.680000 CVE-2025-3709,0,0,bd15d31f777243540548b544e8985e8a31e62890f7bf4ae13fef85062e09984a,2025-05-07T16:50:52.680000
CVE-2025-3710,0,0,5aa43f5fabdf7e9817af1de08a2142fd174a57fb507ed647c50bf588c3363b85,2025-05-12T17:32:52.810000 CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000
CVE-2025-3711,0,0,2b1f73f7c25e1131be9414f8abf0310a7225e0ede93e6016e7f8382780f6561d,2025-05-12T17:32:52.810000 CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000
CVE-2025-3712,0,0,dd9b463afaad18845257a3f3c051550600b24c3aea0efff51395845ccca7350c,2025-05-12T17:32:52.810000 CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000
CVE-2025-3713,0,0,154751ac02fbaf3aaf50af34492bc06e71aef0193ddb6a46a03e4d32dbca6a36,2025-05-12T17:32:52.810000 CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000
CVE-2025-3714,0,0,98a93e61a4a0bb6f50be73e9742e35c249ec9199635d808c3a34b4b6ca53a4ed,2025-05-12T17:32:52.810000 CVE-2025-3714,0,0,3fcd28d3a7b81c31d305f49be6e84a00b4570b4ee1caa0904bee1851b94e6d66,2025-05-28T04:15:45.850000
CVE-2025-3715,0,0,2d1d9dba7f9eff4431b265f83f4af3c259cac9ce8ddae0a96ec092e646ca8d2a,2025-05-19T13:35:20.460000 CVE-2025-3715,0,0,2d1d9dba7f9eff4431b265f83f4af3c259cac9ce8ddae0a96ec092e646ca8d2a,2025-05-19T13:35:20.460000
CVE-2025-3723,0,0,477418a320dfd53a6e935f7e337452b515033da0e585c9ca76a1582be0b01b2c,2025-05-12T20:40:10.330000 CVE-2025-3723,0,0,477418a320dfd53a6e935f7e337452b515033da0e585c9ca76a1582be0b01b2c,2025-05-12T20:40:10.330000
CVE-2025-3724,0,0,18e69c1094bab55d0abc5efd07a77f5bb56c4db0cf848fa0037b08e463c287e2,2025-05-12T20:40:24.853000 CVE-2025-3724,0,0,18e69c1094bab55d0abc5efd07a77f5bb56c4db0cf848fa0037b08e463c287e2,2025-05-12T20:40:24.853000
@ -293477,6 +293481,7 @@ CVE-2025-4005,0,0,3395f342452d81fe28f72171670472e990a8955faacab9ea9a30fcbc3d4e23
CVE-2025-4006,0,0,b4863f9bca9c45c782eac4e0a8df6c153136ca75006dde5bfd67dbac13da0ed2,2025-04-29T13:52:10.697000 CVE-2025-4006,0,0,b4863f9bca9c45c782eac4e0a8df6c153136ca75006dde5bfd67dbac13da0ed2,2025-04-29T13:52:10.697000
CVE-2025-4007,0,0,9777df4491741671ed8bb32daaef6bd13e88a3bc80a38f81c67c7e3aae15aace,2025-04-29T13:52:10.697000 CVE-2025-4007,0,0,9777df4491741671ed8bb32daaef6bd13e88a3bc80a38f81c67c7e3aae15aace,2025-04-29T13:52:10.697000
CVE-2025-4008,0,0,f0130f878a53471d3fb1549dc09ccb4cbdfcbe18d257d761f05f6b646d258a62,2025-05-23T08:15:18.633000 CVE-2025-4008,0,0,f0130f878a53471d3fb1549dc09ccb4cbdfcbe18d257d761f05f6b646d258a62,2025-05-23T08:15:18.633000
CVE-2025-4009,1,1,a48f90cd6b7bf84b4f335a72c36b7bc833d628e392db355b6779faa98ed5af8b,2025-05-28T07:15:24.490000
CVE-2025-4011,0,0,3819550e074b2f97f25ec51252193290e9c87c0a28a7aedb206338328c0e7b76,2025-04-29T13:52:10.697000 CVE-2025-4011,0,0,3819550e074b2f97f25ec51252193290e9c87c0a28a7aedb206338328c0e7b76,2025-04-29T13:52:10.697000
CVE-2025-40114,0,0,18b151536edb74ce6ae0abb057cdaf2f657d28b31cc048efaafef211823a9957,2025-04-29T13:46:29.167000 CVE-2025-40114,0,0,18b151536edb74ce6ae0abb057cdaf2f657d28b31cc048efaafef211823a9957,2025-04-29T13:46:29.167000
CVE-2025-4012,0,0,36dc3f78b0e7e3ac1f05487215ef307e4a3550924eb6d25961b0b1557c98be91,2025-05-12T19:30:30.873000 CVE-2025-4012,0,0,36dc3f78b0e7e3ac1f05487215ef307e4a3550924eb6d25961b0b1557c98be91,2025-05-12T19:30:30.873000
@ -293603,7 +293608,7 @@ CVE-2025-4090,0,0,7f9eabb4ad6772523e0c5f0a270166b4617494fcbb3075e75cc2736a0fa15b
CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000 CVE-2025-40906,0,0,3bcd0a99f567a8c8c8c888444bf8652ce672ff26763dd9562ab4be9a1279c017,2025-05-19T13:35:50.497000
CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000 CVE-2025-40907,0,0,02479ee238b9c2c4380d00bd9d3c9ee05adf00f8c7961fd6f9263c931d94c687,2025-05-16T16:15:41.590000
CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000 CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000
CVE-2025-40911,1,1,5d617aa4f3c4bdbc7ab0031b95d2c6f4ae3adc9c4e4ba8d678d8f4330717f313,2025-05-27T22:15:22.337000 CVE-2025-40911,0,0,5d617aa4f3c4bdbc7ab0031b95d2c6f4ae3adc9c4e4ba8d678d8f4330717f313,2025-05-27T22:15:22.337000
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000 CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000 CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000
CVE-2025-4094,0,0,c4366c891a9ac824ae6e9d82e5a7df040ca58b43955f28a6e84c485206c2a693,2025-05-21T23:15:54.973000 CVE-2025-4094,0,0,c4366c891a9ac824ae6e9d82e5a7df040ca58b43955f28a6e84c485206c2a693,2025-05-21T23:15:54.973000
@ -295160,6 +295165,7 @@ CVE-2025-47947,0,0,937e21e816ace6c7b2eea9b27977c70a0355dffa802eeb709a1580aec3fe9
CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefadd52,2025-05-19T15:15:25.400000 CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefadd52,2025-05-19T15:15:25.400000
CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000 CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000
CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000 CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000
CVE-2025-4800,1,1,effbb959592fe4d51aa2f33071036fb2b9c5d78070f2c0d5ec37a9c50fcffec6,2025-05-28T06:15:22
CVE-2025-48009,0,0,f2f593603a23342f1ed10e6e06b800747a948e9a47401b873fcb7b9febb49dba,2025-05-21T20:24:58.133000 CVE-2025-48009,0,0,f2f593603a23342f1ed10e6e06b800747a948e9a47401b873fcb7b9febb49dba,2025-05-21T20:24:58.133000
CVE-2025-48010,0,0,29ecfb7056487f862ce3f3d52a72af1a1c7498499e974227523a3feeadf25999,2025-05-21T20:24:58.133000 CVE-2025-48010,0,0,29ecfb7056487f862ce3f3d52a72af1a1c7498499e974227523a3feeadf25999,2025-05-21T20:24:58.133000
CVE-2025-48011,0,0,f7a7d415ad80812a779b1090cc64c6da9309fa4d9b5980d621fc83dfabfec97d,2025-05-21T20:24:58.133000 CVE-2025-48011,0,0,f7a7d415ad80812a779b1090cc64c6da9309fa4d9b5980d621fc83dfabfec97d,2025-05-21T20:24:58.133000
@ -295220,11 +295226,11 @@ CVE-2025-4814,0,0,701ab03b7a876ef5bc2e1ad888c3ec9b57b3290dbffe826cdd00c807fcd57d
CVE-2025-48144,0,0,d64923e40fdc0e7e404ab923fc3419b37f7c428f4d5f5c57ca1b8c036d0841cc,2025-05-19T13:35:20.460000 CVE-2025-48144,0,0,d64923e40fdc0e7e404ab923fc3419b37f7c428f4d5f5c57ca1b8c036d0841cc,2025-05-19T13:35:20.460000
CVE-2025-48146,0,0,ab7aa4605de119e1b098c976e2765794696963be887a36cad3a72cd3dfef653e,2025-05-19T13:35:20.460000 CVE-2025-48146,0,0,ab7aa4605de119e1b098c976e2765794696963be887a36cad3a72cd3dfef653e,2025-05-19T13:35:20.460000
CVE-2025-4815,0,0,d56932e9d68c28e8c84ba9340c5fe206f8693cbef9a54e1900a1c0e6a352f201,2025-05-19T16:15:33.753000 CVE-2025-4815,0,0,d56932e9d68c28e8c84ba9340c5fe206f8693cbef9a54e1900a1c0e6a352f201,2025-05-19T16:15:33.753000
CVE-2025-4816,0,0,f14c1cfb83c8c6ed9a0698dfcc95775ad36a530b7fdf1e45228f3250bfb98f58,2025-05-19T16:15:33.863000 CVE-2025-4816,0,0,1d7865e0cbbb0c318cb8ea40d3a767abd03ec76e1a6022bd94025fd37d41588b,2025-05-28T00:59:43.940000
CVE-2025-4817,0,0,dd10739a15af78c4705e3e00a519aed353f304d46b521ddf484b8fc0fc2938a8,2025-05-19T16:15:33.977000 CVE-2025-4817,0,0,f265475ef28de63b3868387a0ba8131291fd27201dee770829df62b575e6a51c,2025-05-28T00:59:22.280000
CVE-2025-48174,0,0,f26469907442315e96b5feb9308b03c4506fc8074c00574b934b171f795f26df,2025-05-16T14:42:18.700000 CVE-2025-48174,0,0,f26469907442315e96b5feb9308b03c4506fc8074c00574b934b171f795f26df,2025-05-16T14:42:18.700000
CVE-2025-48175,0,0,3f6bab737596fdb5634db37c0296a1b165ba48ea379824d01c7b1ce82612cf5b,2025-05-16T14:42:18.700000 CVE-2025-48175,0,0,3f6bab737596fdb5634db37c0296a1b165ba48ea379824d01c7b1ce82612cf5b,2025-05-16T14:42:18.700000
CVE-2025-4818,0,0,65473837bd1909e5e7f653a7d28de0873bcc16d5c4c178e6d14886f055e06866,2025-05-19T16:15:34.087000 CVE-2025-4818,0,0,46d731a7fb69ff2dcbbabe2b3a403a7f0fce04438dcb8f5cef1cb1fefa0dfdd7,2025-05-28T00:58:53.250000
CVE-2025-48187,0,0,be9d0afeae04913d345ed4d335591274c105e6700369ecf88b41657ac12d62eb,2025-05-19T16:15:30.853000 CVE-2025-48187,0,0,be9d0afeae04913d345ed4d335591274c105e6700369ecf88b41657ac12d62eb,2025-05-19T16:15:30.853000
CVE-2025-48188,0,0,9338f093747813e06d902a44455aea29fdf3a611a5e401cd7c2e67e28da8d86c,2025-05-19T13:35:20.460000 CVE-2025-48188,0,0,9338f093747813e06d902a44455aea29fdf3a611a5e401cd7c2e67e28da8d86c,2025-05-19T13:35:20.460000
CVE-2025-4819,0,0,49caec14472d9713a5e005512e05ab68ec95bbd6e0ab80b85d595ebe6722e2cc,2025-05-19T13:35:20.460000 CVE-2025-4819,0,0,49caec14472d9713a5e005512e05ab68ec95bbd6e0ab80b85d595ebe6722e2cc,2025-05-19T13:35:20.460000
@ -295408,6 +295414,14 @@ CVE-2025-48827,0,0,a50f840283fd2bbc9a0c236b8e0a7afc67476d4ec5792331b9e1240a1d96c
CVE-2025-48828,0,0,7babaccf1c826448de50840a4963541ace772dfd59a97c487664d8dadaec9e30,2025-05-27T18:15:31.513000 CVE-2025-48828,0,0,7babaccf1c826448de50840a4963541ace772dfd59a97c487664d8dadaec9e30,2025-05-27T18:15:31.513000
CVE-2025-4883,0,0,5862fdd520821c1eedf697774db7196e34040fbccfc13f239bec6cec686b2e42,2025-05-21T19:38:13.727000 CVE-2025-4883,0,0,5862fdd520821c1eedf697774db7196e34040fbccfc13f239bec6cec686b2e42,2025-05-21T19:38:13.727000
CVE-2025-4884,0,0,2d6b345f6687876df2d3e4cb744a5caa526ce300870cd564926a11af2bccc222,2025-05-19T13:35:20.460000 CVE-2025-4884,0,0,2d6b345f6687876df2d3e4cb744a5caa526ce300870cd564926a11af2bccc222,2025-05-19T13:35:20.460000
CVE-2025-48841,0,0,7f0e0c969efb3bef9720951c083cd77dcf55000205a06e477705e2d5154973aa,2025-05-28T04:15:46.770000
CVE-2025-48842,0,0,ba4bb2008ab25dba5eb316ee71e55945ac6c6e86998ead36e4c18bbc602b9af6,2025-05-28T04:15:47.390000
CVE-2025-48843,0,0,289fb4ccd51aa9f39fc7cb046c750bb2c9f1a40b8367b3b0a2c79fa22f4210f1,2025-05-28T04:15:49.640000
CVE-2025-48844,0,0,691afc4818b837f5124b1a7a449458230f6243d5fbc198f10ae02e1957b945fa,2025-05-28T04:15:49.917000
CVE-2025-48845,0,0,28c2c377a50b04054cbacd4d8a00509c2a1ec14792776b092a7a173a471a81fb,2025-05-28T04:15:49.990000
CVE-2025-48846,0,0,b4331e28b4548a0a81d0232dc77a343853591cec3e2f531b56c1d53501bb623a,2025-05-28T04:15:50.067000
CVE-2025-48847,0,0,b8563d91ba0679f627536816b3f17216a89f937d1a7db8c25b786323bd30235b,2025-05-28T04:15:50.140000
CVE-2025-48848,0,0,38731265ae915b14c5e915b02c11b0e53a54815641117da26fffd1c6f20ec7db,2025-05-28T04:15:50.207000
CVE-2025-4885,0,0,71690adb8bb16dc3b0abf632ff77fd8611dc09917588754b8c57e67fe3a44bd2,2025-05-19T13:35:20.460000 CVE-2025-4885,0,0,71690adb8bb16dc3b0abf632ff77fd8611dc09917588754b8c57e67fe3a44bd2,2025-05-19T13:35:20.460000
CVE-2025-4886,0,0,f0bc96dcd8776bcc92f543590bbb95ec4351295de136202b130c74e915ed1af1,2025-05-19T13:35:20.460000 CVE-2025-4886,0,0,f0bc96dcd8776bcc92f543590bbb95ec4351295de136202b130c74e915ed1af1,2025-05-19T13:35:20.460000
CVE-2025-4887,0,0,a7b499ed3cdf6c879f3ec3b69793ad811740da88bfec778065c6ba52abd3d64a,2025-05-19T13:35:20.460000 CVE-2025-4887,0,0,a7b499ed3cdf6c879f3ec3b69793ad811740da88bfec778065c6ba52abd3d64a,2025-05-19T13:35:20.460000
@ -295460,11 +295474,12 @@ CVE-2025-4934,0,0,223d290223d766bd8fadc58a50b1e245df2a17d05c7a82ae8c467c7317c633
CVE-2025-4935,0,0,0924c431ea344338f09c6746a2eb896f1051ac5651ba0c066119ecf4a65489d5,2025-05-21T20:25:33.823000 CVE-2025-4935,0,0,0924c431ea344338f09c6746a2eb896f1051ac5651ba0c066119ecf4a65489d5,2025-05-21T20:25:33.823000
CVE-2025-4936,0,0,52f00703e856a8895a4ad73331c7e04059651f0c33578ef1dfde1a53c8bf17d2,2025-05-21T20:25:33.823000 CVE-2025-4936,0,0,52f00703e856a8895a4ad73331c7e04059651f0c33578ef1dfde1a53c8bf17d2,2025-05-21T20:25:33.823000
CVE-2025-4937,0,0,04c10f6938329dfd4cb4a045dea1d120d3485da87d3dc89f52a5fd817e2ecd60,2025-05-21T20:25:33.823000 CVE-2025-4937,0,0,04c10f6938329dfd4cb4a045dea1d120d3485da87d3dc89f52a5fd817e2ecd60,2025-05-21T20:25:33.823000
CVE-2025-4938,0,0,869000ce212a95a4f151806c116520d3892cf0d02e418337c2a222fe633e7492,2025-05-21T20:25:16.407000 CVE-2025-4938,0,0,9bfbb8aefdfbb754eacbb83a30a05c557a118de2c85e31be873a9e69bcb3eeca,2025-05-28T01:33:36.677000
CVE-2025-4939,0,0,900a9898cac9c0072a6851a87a1fc394fc59a43f240149c960c6ba983fe7fa0a,2025-05-21T20:25:16.407000 CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000
CVE-2025-4940,0,0,2476264f5ca230e398816216f503ad21bd6ee0718fc81a3cc8e1ef1268a9a775,2025-05-21T20:25:16.407000 CVE-2025-4940,0,0,2476264f5ca230e398816216f503ad21bd6ee0718fc81a3cc8e1ef1268a9a775,2025-05-21T20:25:16.407000
CVE-2025-4941,0,0,82d771500a33f9b956507ffd28047b96677ad4beb2427845b21268f137b2c892,2025-05-21T20:25:16.407000 CVE-2025-4941,0,0,7ee6643b2dca5855a4c8910cf9fb3433ecd0901f54d071fbb7ffd69250830b9c,2025-05-28T01:31:03.773000
CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000 CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000
CVE-2025-4947,1,1,41b4309526023f35da5d8a9cbf74ea981242bfda1f99d26c1c00c59137d84ac7,2025-05-28T07:15:24.780000
CVE-2025-4948,0,0,dbe30938d8190315dbaa2e8d5919e8362721c3330df496b34aaab2abe9515761,2025-05-26T12:15:23.963000 CVE-2025-4948,0,0,dbe30938d8190315dbaa2e8d5919e8362721c3330df496b34aaab2abe9515761,2025-05-26T12:15:23.963000
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000 CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000 CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
@ -295481,17 +295496,18 @@ CVE-2025-4998,0,0,a06730a0691f90a016a49869bfa33e7c322397c4e2518cd0a37207b1507563
CVE-2025-4999,0,0,13735415b149480bfb9de9a45e935c4947f4c7ec7df58eed18894635f565eb11,2025-05-21T20:24:58.133000 CVE-2025-4999,0,0,13735415b149480bfb9de9a45e935c4947f4c7ec7df58eed18894635f565eb11,2025-05-21T20:24:58.133000
CVE-2025-5000,0,0,b88fb5c3c6d713007bd8f08b5b98b94c4b65f452e1cfcae4950b23010aca8b7a,2025-05-21T20:24:58.133000 CVE-2025-5000,0,0,b88fb5c3c6d713007bd8f08b5b98b94c4b65f452e1cfcae4950b23010aca8b7a,2025-05-21T20:24:58.133000
CVE-2025-5001,0,0,31ad5c5ea8790484d4eb2202eb4a0629e0128642e382cfb8927c9b9893b4fc3b,2025-05-21T20:24:58.133000 CVE-2025-5001,0,0,31ad5c5ea8790484d4eb2202eb4a0629e0128642e382cfb8927c9b9893b4fc3b,2025-05-21T20:24:58.133000
CVE-2025-5002,0,0,aa550d09179c9601bc82e597278e3339b109c2d213b463d7ead2b28dedc0c87f,2025-05-21T20:24:58.133000 CVE-2025-5002,0,0,971f36c284dfb1e294c2db4acf298a0f7591c6e0e260cfb633ad289f7903a4d3,2025-05-28T01:25:25.310000
CVE-2025-5003,0,0,9a44f46b154e04fe5f03f8443daf3417b6856b5aba0b0c5c35c060291d7e4b67,2025-05-21T20:24:58.133000 CVE-2025-5003,0,0,8e5e1d9761ca938d3fd35aea708db39277e66b20b656a3195e150358582db8aa,2025-05-28T01:24:21.800000
CVE-2025-5004,0,0,98a1e99d8b9fad0ef327b4c81df373b549ef5dd0fa093c7d9c1f1be9f199e7b0,2025-05-21T20:24:58.133000 CVE-2025-5004,0,0,d7fd9b6c8114c9ac860c14fa88897684c73b2b8251dca41c12cda3a8ce9d421c,2025-05-28T01:20:50.517000
CVE-2025-5006,0,0,729926df09abb067b82af766b59c94064c0f4dede57c63b42c7f94d4794cc929,2025-05-21T20:24:58.133000 CVE-2025-5006,0,0,681cabb0d000288ea3de1bc96c248c8dc62af67d94cda924b490a24cb5ce4b87,2025-05-28T01:16:17.537000
CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000 CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000
CVE-2025-5008,0,0,895e1964dc0670383faa4bfe12d1cb725d77ab879d8cc70a1871495cd50c3e48,2025-05-21T23:15:55.200000 CVE-2025-5008,0,0,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d57,2025-05-28T01:06:49.867000
CVE-2025-5010,0,0,93497e2b48b334d59fac1bb8ca9073e5f336f986ef89ce0b89f9db876e65e870,2025-05-21T23:15:55.330000 CVE-2025-5010,0,0,93497e2b48b334d59fac1bb8ca9073e5f336f986ef89ce0b89f9db876e65e870,2025-05-21T23:15:55.330000
CVE-2025-5011,0,0,d1caeeaa784d143902e41e16fc8809733bc411c4665df188f33764965bcab2ec,2025-05-21T23:15:55.447000 CVE-2025-5011,0,0,d1caeeaa784d143902e41e16fc8809733bc411c4665df188f33764965bcab2ec,2025-05-21T23:15:55.447000
CVE-2025-5013,0,0,9e2206cee3d9a4da13b7d790d61a24286d0c704fc74b7b095d3cf27be2eea613,2025-05-21T23:15:55.563000 CVE-2025-5013,0,0,9e2206cee3d9a4da13b7d790d61a24286d0c704fc74b7b095d3cf27be2eea613,2025-05-21T23:15:55.563000
CVE-2025-5020,0,0,8e92e81268cb02470f5321fbe111bd1217491079f6b87fc538686f0917f7768a,2025-05-21T20:24:58.133000 CVE-2025-5020,0,0,8e92e81268cb02470f5321fbe111bd1217491079f6b87fc538686f0917f7768a,2025-05-21T20:24:58.133000
CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000 CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000
CVE-2025-5025,1,1,7453e6923eb1a45f61a94bcc35c54f4d6c6e3d7ea83c8b1a686b8ff6ef78a86a,2025-05-28T07:15:24.910000
CVE-2025-5029,0,0,ecb9afcd5e588564920b0ea2535593ae37c1896d06cac3ff8323350bc3b94721,2025-05-21T20:24:58.133000 CVE-2025-5029,0,0,ecb9afcd5e588564920b0ea2535593ae37c1896d06cac3ff8323350bc3b94721,2025-05-21T20:24:58.133000
CVE-2025-5030,0,0,524bdc59d3cf3de128931a2064721f0c18eb0893fa1e7a140dbc00738f726523,2025-05-21T20:24:58.133000 CVE-2025-5030,0,0,524bdc59d3cf3de128931a2064721f0c18eb0893fa1e7a140dbc00738f726523,2025-05-21T20:24:58.133000
CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000 CVE-2025-5031,0,0,5f2ab8d2bd00dbf44f07508d2176837c7f0d7e14295892849ea6ba136599d0aa,2025-05-21T20:24:58.133000
@ -295503,10 +295519,10 @@ CVE-2025-5051,0,0,9c110d30fb7d5b76a834a2709876396dbb061a47276883a9c8b6f8ca7926c4
CVE-2025-5052,0,0,aa387e74996184bbceb7dcb0f0533b96402b1f03de23f558fcebbd4c6085f924,2025-05-23T15:55:02.040000 CVE-2025-5052,0,0,aa387e74996184bbceb7dcb0f0533b96402b1f03de23f558fcebbd4c6085f924,2025-05-23T15:55:02.040000
CVE-2025-5053,0,0,d1f3d03feac0d168cc0b9fceb4dacff5c6f1aabc5f310733ca2bf60999576839,2025-05-23T15:55:02.040000 CVE-2025-5053,0,0,d1f3d03feac0d168cc0b9fceb4dacff5c6f1aabc5f310733ca2bf60999576839,2025-05-23T15:55:02.040000
CVE-2025-5055,0,0,d4a91ae5f00ddb3d7d93c133377af96d82720d9fe60fd3aa075ce0c3c6bb5ff8,2025-05-24T03:15:24.523000 CVE-2025-5055,0,0,d4a91ae5f00ddb3d7d93c133377af96d82720d9fe60fd3aa075ce0c3c6bb5ff8,2025-05-24T03:15:24.523000
CVE-2025-5056,0,0,5d828001fcf3a0c7199423756892ef7203d79c93ef8f9b9ff6a40503329589d2,2025-05-23T15:55:02.040000 CVE-2025-5056,0,0,41abcc4b21c4c44af1bb2b5ebe6eed640fd93ff380221b407c4bb670519af696,2025-05-28T02:08:30.840000
CVE-2025-5057,0,0,9ab19a2c6361cda5644cf55ac09c66d34ed104e148938809e5ea8cd6c9f9297f,2025-05-23T15:55:02.040000 CVE-2025-5057,0,0,c177a6255394eb47f572d99869089826f5992edac771e2e307615417afe5454f,2025-05-28T02:04:36.163000
CVE-2025-5058,0,0,33bbc180837c7bff4c1df8f50429e7ffffb5678857a47e56a7d4d34987379b2f,2025-05-24T04:15:32.560000 CVE-2025-5058,0,0,33bbc180837c7bff4c1df8f50429e7ffffb5678857a47e56a7d4d34987379b2f,2025-05-24T04:15:32.560000
CVE-2025-5059,0,0,05a7e8fd4cdbbb0bda914599a983f96db3a6a250cd413b41e5799b0229b6e3b4,2025-05-23T15:55:02.040000 CVE-2025-5059,0,0,f8f742257ec34ff8db6f494385cd1222a7c04c23d48b685959ae7dfe1442b4eb,2025-05-28T02:02:49.230000
CVE-2025-5062,0,0,bb09b5c3154dbeb834d9f154b075fadf5acce7938c0b0ea58fb15d93688394c5,2025-05-23T15:55:02.040000 CVE-2025-5062,0,0,bb09b5c3154dbeb834d9f154b075fadf5acce7938c0b0ea58fb15d93688394c5,2025-05-23T15:55:02.040000
CVE-2025-5063,0,0,22ca900734388c6e87a6f1c1d076a04db13a36781e80c3ddef8cd31a73409229,2025-05-27T21:15:22.310000 CVE-2025-5063,0,0,22ca900734388c6e87a6f1c1d076a04db13a36781e80c3ddef8cd31a73409229,2025-05-27T21:15:22.310000
CVE-2025-5064,0,0,5412602dfbe69e3fee5c3d5277c15337fff6fe96475eaf15941207c6ddef2f9d,2025-05-27T21:15:22.457000 CVE-2025-5064,0,0,5412602dfbe69e3fee5c3d5277c15337fff6fe96475eaf15941207c6ddef2f9d,2025-05-27T21:15:22.457000
@ -295517,11 +295533,11 @@ CVE-2025-5073,0,0,baf1c84b4e2167692053943d4c0fd05e8f8f1a1d5bd906b6480eed1245a366
CVE-2025-5074,0,0,9ba68eed20e336e3555aa374d8a228cbc63c1570f254cad86d2d34a36791d8af,2025-05-23T15:55:02.040000 CVE-2025-5074,0,0,9ba68eed20e336e3555aa374d8a228cbc63c1570f254cad86d2d34a36791d8af,2025-05-23T15:55:02.040000
CVE-2025-5075,0,0,3557427c3c8420f28dd5505d5532f5e698013ee739fdf7287e91d365cc97d126,2025-05-23T15:55:02.040000 CVE-2025-5075,0,0,3557427c3c8420f28dd5505d5532f5e698013ee739fdf7287e91d365cc97d126,2025-05-23T15:55:02.040000
CVE-2025-5076,0,0,a265efd0a028820c9cc3f4c11b758391961dd4fc4ffcbd490a4aa72d99696687,2025-05-23T15:55:02.040000 CVE-2025-5076,0,0,a265efd0a028820c9cc3f4c11b758391961dd4fc4ffcbd490a4aa72d99696687,2025-05-23T15:55:02.040000
CVE-2025-5077,0,0,cf81ddf3855e45cd147cfd7c7be25296289304b97720caf90b928027abccdf00,2025-05-23T15:55:02.040000 CVE-2025-5077,0,0,5bb361381f7737ab78bfa864953c20bd9e7bf1942fef8fedd416b02808d591ef,2025-05-28T01:53:25.660000
CVE-2025-5078,0,0,df85c537c14582ba004ffd2b6a92d72a1ced9a8d3f4c98bcb4839f6491cd7d7f,2025-05-23T15:55:02.040000 CVE-2025-5078,0,0,57059c330cb53e9cb302cf773988b3ce2f731665e7a246772389547bf3f9a34e,2025-05-28T01:52:35.277000
CVE-2025-5079,0,0,02d5c4d06d5b360debb658e138db50131ce3cfcaf0a34013fdc121faa9ffe241,2025-05-23T15:55:02.040000 CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5cf,2025-05-28T01:50:48.303000
CVE-2025-5080,0,0,0cab754d3cfde3d6b3a70ea302e2a63cd1cd3967167bff559ff2766fb5a65083,2025-05-23T15:55:02.040000 CVE-2025-5080,0,0,0cab754d3cfde3d6b3a70ea302e2a63cd1cd3967167bff559ff2766fb5a65083,2025-05-23T15:55:02.040000
CVE-2025-5081,0,0,ecde03903b4e0c77270ee0ba286b46b025588f611ffa017092a0d00ce3f95461,2025-05-23T15:55:02.040000 CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000
CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000 CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000
CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000 CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000
CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000 CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000
@ -295648,7 +295664,7 @@ CVE-2025-5269,0,0,d6648849e120117658a5acbb7c16bd50f1ca75dd50023c661ee16daa0a44e5
CVE-2025-5270,0,0,195d1ef223876a1ec6a8c475b807542100c76e8f13d2a0cc3fa336118c44e511,2025-05-27T18:15:37.290000 CVE-2025-5270,0,0,195d1ef223876a1ec6a8c475b807542100c76e8f13d2a0cc3fa336118c44e511,2025-05-27T18:15:37.290000
CVE-2025-5271,0,0,c2c01f356cb96bac957222d1bd9c2ac4c9b8fcd9d264490b0acea16f5708168f,2025-05-27T18:15:37.647000 CVE-2025-5271,0,0,c2c01f356cb96bac957222d1bd9c2ac4c9b8fcd9d264490b0acea16f5708168f,2025-05-27T18:15:37.647000
CVE-2025-5272,0,0,8ec12de90a46bb3ebdf50942dc0dc925b2afae99ec7433fea0df5b77b7608dd5,2025-05-27T15:15:36.627000 CVE-2025-5272,0,0,8ec12de90a46bb3ebdf50942dc0dc925b2afae99ec7433fea0df5b77b7608dd5,2025-05-27T15:15:36.627000
CVE-2025-5278,0,0,4e0b1b7e2263225630af8f91853ae0768e48246fd1734d5d49b2c463d552869e,2025-05-27T21:15:23.197000 CVE-2025-5278,0,0,136a37aa0f1d08163203be01cae4e756c87c8835551b97d174bd708954d4fdc8,2025-05-28T01:15:19.730000
CVE-2025-5279,0,0,4ae9b68433e92a9b98a184625269a81df7364baa91a596e5f693470b37bc9676,2025-05-27T21:15:23.370000 CVE-2025-5279,0,0,4ae9b68433e92a9b98a184625269a81df7364baa91a596e5f693470b37bc9676,2025-05-27T21:15:23.370000
CVE-2025-5280,0,0,5e36bf8d4d6b58866390a6b6e33e15d4ba11afa7a6cbce31f85ca477449203fb,2025-05-27T21:15:23.580000 CVE-2025-5280,0,0,5e36bf8d4d6b58866390a6b6e33e15d4ba11afa7a6cbce31f85ca477449203fb,2025-05-27T21:15:23.580000
CVE-2025-5281,0,0,5fa8158ef4cf2e9ea1d36dc51d0f018cfaf38c242246d13b684663163c09dc0c,2025-05-27T21:15:23.717000 CVE-2025-5281,0,0,5fa8158ef4cf2e9ea1d36dc51d0f018cfaf38c242246d13b684663163c09dc0c,2025-05-27T21:15:23.717000

Can't render this file because it is too large.