diff --git "a/corpus/nvd_cve.json" "b/corpus/nvd_cve.json" new file mode 100644--- /dev/null +++ "b/corpus/nvd_cve.json" @@ -0,0 +1,39493 @@ +{ + "CVE_data_type" : "CVE", + "CVE_data_format" : "MITRE", + "CVE_data_version" : "4.0", + "CVE_data_numberOfCVEs" : "822", + "CVE_data_timestamp" : "2025-06-03T12:00Z", + "CVE_Items" : [ { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5493", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://medium.com/@luoluoxi311/sql-injection-in-baison-channel-middleware-product-version-2-0-1-e0d1ec95c697", + "name" : "https://medium.com/@luoluoxi311/sql-injection-in-baison-channel-middleware-product-version-2-0-1-e0d1ec95c697", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310910", + "name" : "VDB-310910 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310910", + "name" : "VDB-310910 | Baison Channel Middleware Product ToJsonByControlName sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586972", + "name" : "Submit #586972 | BAISON Channel Middleware Product 2.0.1 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Baison Channel Middleware Product 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file /e3api/api/main/ToJsonByControlName. The manipulation of the argument data leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-03T11:15Z", + "lastModifiedDate" : "2025-06-03T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5492", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-77" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310909", + "name" : "VDB-310909 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310909", + "name" : "VDB-310909 | D-Link DI-500WF-WT /usr/sbin/jhttpd msp_info.htm sub_456DE8 command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.575244", + "name" : "Submit #575244 | D-Link DI-500WF-WT latest Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.dlink.com/", + "name" : "https://www.dlink.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-03T11:15Z", + "lastModifiedDate" : "2025-06-03T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4392", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/anssilaitila/shared-files/blob/master/admin/class-sf-admin-allow-more-file-types.php", + "name" : "https://github.com/anssilaitila/shared-files/blob/master/admin/class-sf-admin-allow-more-file-types.php", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3304053/", + "name" : "https://plugins.trac.wordpress.org/changeset/3304053/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/shared-files/#developers", + "name" : "https://wordpress.org/plugins/shared-files/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/469a9c8a-0708-4c93-99d8-e9157a1f91f5?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/469a9c8a-0708-4c93-99d8-e9157a1f91f5?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Shared Files – Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via html File uploads in all versions up to, and including, 1.7.48 due to insufficient input sanitization and output escaping within the sanitize_file() function. This makes it possible for unauthenticated attackers to bypass the plugin’s MIME-only checks and inject arbitrary web scripts in pages that will execute whenever a user accesses the html file." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 7.2, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-06-03T10:15Z", + "lastModifiedDate" : "2025-06-03T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31359", + "ASSIGNER" : "talos-cna@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2160", + "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2160", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2160", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2160", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A directory traversal vulnerability exists in the PVMP package unpacking functionality of Parallels Desktop for Mac version 20.2.2 (55879). This vulnerability can be exploited by an attacker to write to arbitrary files, potentially leading to privilege escalation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T10:15Z", + "lastModifiedDate" : "2025-06-03T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-54189", + "ASSIGNER" : "talos-cna@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2124", + "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2124", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2124", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2124", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T10:15Z", + "lastModifiedDate" : "2025-06-03T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-52561", + "ASSIGNER" : "talos-cna@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2123", + "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2123", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2123", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2123", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is deleted, a root service verifies and modifies the ownership of the snapshot files. By using a symlink, an attacker can change the ownership of files owned by root to a lower-privilege user, potentially leading to privilege escalation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T10:15Z", + "lastModifiedDate" : "2025-06-03T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-36486", + "ASSIGNER" : "talos-cna@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2126", + "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2126", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2126", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2126", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T10:15Z", + "lastModifiedDate" : "2025-06-03T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5116", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/DLXPlugins/wp-plugin-info-card/blob/dev/php/Shortcodes.php#L893", + "name" : "https://github.com/DLXPlugins/wp-plugin-info-card/blob/dev/php/Shortcodes.php#L893", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/wp-plugin-info-card/trunk/php/Shortcodes.php#L929", + "name" : "https://plugins.trac.wordpress.org/browser/wp-plugin-info-card/trunk/php/Shortcodes.php#L929", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3303791", + "name" : "https://plugins.trac.wordpress.org/changeset/3303791", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/wp-plugin-info-card/#developers", + "name" : "https://wordpress.org/plugins/wp-plugin-info-card/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e29ea7dd-14b8-45d3-a87e-3f58de88af4c?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e29ea7dd-14b8-45d3-a87e-3f58de88af4c?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The WP Plugin Info Card plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘containerid’ parameter in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue is due to an incomplete patch for CVE-2025-31835." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-06-03T09:15Z", + "lastModifiedDate" : "2025-06-03T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5103", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/woo-gift-cards-lite/tags/3.1.4/admin/class-woocommerce-gift-cards-lite-admin.php#L571", + "name" : "https://plugins.trac.wordpress.org/browser/woo-gift-cards-lite/tags/3.1.4/admin/class-woocommerce-gift-cards-lite-admin.php#L571", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3303359/", + "name" : "https://plugins.trac.wordpress.org/changeset/3303359/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/woo-gift-cards-lite/#developers", + "name" : "https://wordpress.org/plugins/woo-gift-cards-lite/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e89383-a9c6-4300-970c-0b36e4d97e3d?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e89383-a9c6-4300-970c-0b36e4d97e3d?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Ultimate Gift Cards for WooCommerce plugin for WordPress is vulnerable to boolean-based SQL Injection via the 'default_price' and 'product_id' parameters in all versions up to, and including, 3.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.9, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.2, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-06-03T09:15Z", + "lastModifiedDate" : "2025-06-03T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4420", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/admin-api.php#L6", + "name" : "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/admin-api.php#L6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3303594/", + "name" : "https://plugins.trac.wordpress.org/changeset/3303594/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/vayu-blocks/#developers", + "name" : "https://wordpress.org/plugins/vayu-blocks/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/db01bc0a-4508-4fb5-941d-3f1a52528e2b?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/db01bc0a-4508-4fb5-941d-3f1a52528e2b?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘containerWidth’ parameter in all versions up to, and including, 1.3.1 due to a missing capability check on the vayu_blocks_option_panel_callback() function and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-06-03T09:15Z", + "lastModifiedDate" : "2025-06-03T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1725", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-434" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/file-manager/tags/6.6.3/backend/app/Http/Controllers/FileManagerController.php#L112", + "name" : "https://plugins.trac.wordpress.org/browser/file-manager/tags/6.6.3/backend/app/Http/Controllers/FileManagerController.php#L112", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/84ddb481-f989-4ba8-9925-e8327c30de38?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/84ddb481-f989-4ba8-9925-e8327c30de38?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-06-03T09:15Z", + "lastModifiedDate" : "2025-06-03T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46355", + "ASSIGNER" : "vultures@jpcert.or.jp" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-276" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jvn.jp/en/jp/JVN05562338/", + "name" : "https://jvn.jp/en/jp/JVN05562338/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.keiyo-system.co.jp/archives/11305", + "name" : "https://www.keiyo-system.co.jp/archives/11305", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T08:15Z", + "lastModifiedDate" : "2025-06-03T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41428", + "ASSIGNER" : "vultures@jpcert.or.jp" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jvn.jp/en/jp/JVN37075430/", + "name" : "https://jvn.jp/en/jp/JVN37075430/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.keiyo-system.co.jp/archives/11310", + "name" : "https://www.keiyo-system.co.jp/archives/11310", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON files on the server may be viewed by a remote unauthenticated attacker." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T08:15Z", + "lastModifiedDate" : "2025-06-03T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-21479", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "CHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.6, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 6.0 + } + }, + "publishedDate" : "2025-06-03T07:15Z", + "lastModifiedDate" : "2025-06-03T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4567", + "ASSIGNER" : "contact@wpscan.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://wpscan.com/vulnerability/b8a50ae9-40c4-42f8-9342-2440d3bc12bb/", + "name" : "https://wpscan.com/vulnerability/b8a50ae9-40c4-42f8-9342-2440d3bc12bb/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Post Slider and Post Carousel with Post Vertical Scrolling Widget WordPress plugin before 3.2.10 does not validate and escape some of its Widget options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3662", + "ASSIGNER" : "contact@wpscan.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://wpscan.com/vulnerability/4cda12f0-3c23-44ad-80ea-db2443ebcf82/", + "name" : "https://wpscan.com/vulnerability/4cda12f0-3c23-44ad-80ea-db2443ebcf82/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The FancyBox for WordPress plugin before 3.3.6 does not escape captions and titles attributes before using them to populate galleries' caption fields. The issue was received as a Contributor+ Stored XSS, however one of our researcher (Marc Montpas) escalated it to an Unauthenticated Stored XSS" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3584", + "ASSIGNER" : "contact@wpscan.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://wpscan.com/vulnerability/76937bdd-7ffa-4b5e-ade1-60da095a03a3/", + "name" : "https://wpscan.com/vulnerability/76937bdd-7ffa-4b5e-ade1-60da095a03a3/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Newsletter WordPress plugin before 8.8.2 does not sanitise and escape some of its Subscription settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31712", + "ASSIGNER" : "security@unisoc.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", + "name" : "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In cplog service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31711", + "ASSIGNER" : "security@unisoc.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", + "name" : "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In cplog service, there is a possible system crash due to null pointer dereference. This could lead to local denial of service with no additional execution privileges needed." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31710", + "ASSIGNER" : "security@unisoc.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", + "name" : "https://www.unisoc.com/en_us/secy/announcementDetail/1929773763314909186", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In engineermode service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27038", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-416" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption while rendering graphics using Adreno GPU drivers in Chrome." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "HIGH", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.5, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.6, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27031", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-416" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "memory corruption while processing IOCTL commands, when the buffer in write loopback mode is accessed after being freed." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27029", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-126" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Transient DOS while processing the tone measurement response buffer when the response buffer is out of range." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 7.5, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-21486", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-822" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption during dynamic process creation call when client is only passing address and length of shell binary." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-21485", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-367" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption while processing INIT and multimode invoke IOCTL calls on FastRPC." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-21480", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "CHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.6, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 6.0 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-21463", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-126" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Transient DOS while processing the EHT operation IE in the received beacon frame." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 7.5, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53026", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-126" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "LOW", + "baseScore" : 8.2, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 4.2 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53021", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-126" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Information disclosure may occur while processing goodbye RTCP packet from network." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "LOW", + "baseScore" : 8.2, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 4.2 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53020", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-126" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Information disclosure may occur while decoding the RTP packet with invalid header extension from network." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "LOW", + "baseScore" : 8.2, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 4.2 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53019", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-126" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Information disclosure may occur while decoding the RTP packet with improper header length for number of contributing sources." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "LOW", + "baseScore" : 8.2, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 4.2 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53018", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-367" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption may occur while processing the OIS packet parser." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "HIGH", + "availabilityImpact" : "LOW", + "baseScore" : 6.6, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 4.7 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53017", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-823" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption while handling test pattern generator IOCTL command." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "HIGH", + "availabilityImpact" : "LOW", + "baseScore" : 6.6, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 4.7 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53016", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-367" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption while processing I2C settings in Camera driver." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "HIGH", + "availabilityImpact" : "LOW", + "baseScore" : 6.6, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 4.7 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53015", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-416" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption while processing IOCTL command to handle buffers associated with a session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "HIGH", + "availabilityImpact" : "LOW", + "baseScore" : 6.6, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 4.7 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53013", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption may occur while processing voice call registration with user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "HIGH", + "availabilityImpact" : "LOW", + "baseScore" : 6.6, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 4.7 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53010", + "ASSIGNER" : "security.cna@qualcomm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory corruption may occur while attaching VM when the HLOS retains access to VM." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-03T06:15Z", + "lastModifiedDate" : "2025-06-03T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4797", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-288" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://themeforest.net/item/golo-directory-listing-travel-wordpress-theme/25397810", + "name" : "https://themeforest.net/item/golo-directory-listing-travel-wordpress-theme/25397810", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b56ec1-8735-4404-8069-219f5d8866d0?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b56ec1-8735-4404-8069-219f5d8866d0?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Golo - City Travel Guide WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.7.0. This is due to the plugin not properly validating a user's identity prior to setting an authorization cookie. This makes it possible for unauthenticated attackers to log in as any user, including administrators, provided they know the user's email address." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-03T05:15Z", + "lastModifiedDate" : "2025-06-03T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4224", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gvectors.com/product/wpforo-advanced-attachments/#tab-changelog", + "name" : "https://gvectors.com/product/wpforo-advanced-attachments/#tab-changelog", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e634dafc-8eb0-406f-93b1-ee1d2b44171d?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e634dafc-8eb0-406f-93b1-ee1d2b44171d?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The wpForo + wpForo Advanced Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via media upload names in all versions up to, and including, 3.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 7.2, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-06-03T03:15Z", + "lastModifiedDate" : "2025-06-03T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4047", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/broken-link-checker/tags/2.4.2/legacy/core/core.php#L3272", + "name" : "https://plugins.trac.wordpress.org/browser/broken-link-checker/tags/2.4.2/legacy/core/core.php#L3272", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3294992/", + "name" : "https://plugins.trac.wordpress.org/changeset/3294992/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/33ac910c-9531-45ea-84cf-1d379233f7d3?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/33ac910c-9531-45ea-84cf-1d379233f7d3?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Broken Link Checker plugin for WordPress is vulnerable to unauthorized data access due to a missing capability check on the ajax_full_status and ajax_dashboard_status functions in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view the plugin's status." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-03T03:15Z", + "lastModifiedDate" : "2025-06-03T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2939", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-502" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.18/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "name" : "https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.18/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.19/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "name" : "https://plugins.trac.wordpress.org/browser/ninja-tables/tags/5.0.19/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/ninja-tables/trunk/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "name" : "https://plugins.trac.wordpress.org/browser/ninja-tables/trunk/vendor/wpfluent/framework/src/WPFluent/Http/Client.php#L399", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e38553d-5dba-4c84-95f7-43420245c770?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e38553d-5dba-4c84-95f7-43420245c770?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Ninja Tables – Easy Data Table Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.0.18 via deserialization of untrusted input from the args[callback] parameter . This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary functions, though it does not allow user supplied parameters only single functions can be called so the impact is limited." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "HIGH", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 5.6, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.2, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-03T03:15Z", + "lastModifiedDate" : "2025-06-03T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5419", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html", + "name" : "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://issues.chromium.org/issues/420636529", + "name" : "https://issues.chromium.org/issues/420636529", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T00:15Z", + "lastModifiedDate" : "2025-06-03T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5068", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-416" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html", + "name" : "https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://issues.chromium.org/issues/409059706", + "name" : "https://issues.chromium.org/issues/409059706", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Use after free in Blink in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T00:15Z", + "lastModifiedDate" : "2025-06-03T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-49164", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-321" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://full-disclosure.eu/reports/2025/FDEU-CVE-2025-1c00-arris-bootloader-shell-injection.html", + "name" : "https://full-disclosure.eu/reports/2025/FDEU-CVE-2025-1c00-arris-bootloader-shell-injection.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Arris VIP1113 devices through 2025-05-30 with KreaTV SDK have a firmware decryption key of cd1c2d78f2cba1f73ca7e697b4a485f49a8a7d0c8b0fdc9f51ced50f2530668a." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T00:15Z", + "lastModifiedDate" : "2025-06-03T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-49163", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-424" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://full-disclosure.eu/reports/2025/FDEU-CVE-2025-1c00-arris-bootloader-shell-injection.html", + "name" : "https://full-disclosure.eu/reports/2025/FDEU-CVE-2025-1c00-arris-bootloader-shell-injection.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow booting an arbitrary image via a crafted /usr/bin/gunzip file." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T00:15Z", + "lastModifiedDate" : "2025-06-03T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-49162", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-424" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://full-disclosure.eu/reports/2025/FDEU-CVE-2025-1c00-arris-bootloader-shell-injection.html", + "name" : "https://full-disclosure.eu/reports/2025/FDEU-CVE-2025-1c00-arris-bootloader-shell-injection.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow file overwrite via TFTP because a remote filename with a space character allows an attacker to control the local filename." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-03T00:15Z", + "lastModifiedDate" : "2025-06-03T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3919", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/comments-import-export-woocommerce/trunk/includes/settings/class-hf_cmt_impexpcsv-settings.php?rev=3278076", + "name" : "https://plugins.trac.wordpress.org/browser/comments-import-export-woocommerce/trunk/includes/settings/class-hf_cmt_impexpcsv-settings.php?rev=3278076", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3288894/", + "name" : "https://plugins.trac.wordpress.org/changeset/3288894/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3301183/", + "name" : "https://plugins.trac.wordpress.org/changeset/3301183/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f8bc8863-04a9-4631-9510-624f98ea1e75?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f8bc8863-04a9-4631-9510-624f98ea1e75?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The WordPress Comments Import & Export plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_settings function in all versions up to, and including, 2.4.3. Additionally, the plugin fails to properly sanitize and escape FTP settings parameters. \r\nThis makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts on the plugin settings page that will execute whenever an administrative user accesses an injected page.\r\nThe vulnerability was partially fixed in version 2.4.3 and fully fixed in version 2.4.4" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-06-02T23:15Z", + "lastModifiedDate" : "2025-06-02T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48996", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-201" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/haxtheweb/issues/security/advisories/GHSA-fvx2-x7ff-fc56", + "name" : "https://github.com/haxtheweb/issues/security/advisories/GHSA-fvx2-x7ff-fc56", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/haxtheweb/open-apis/commit/06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7", + "name" : "https://github.com/haxtheweb/open-apis/commit/06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "HAX open-apis provides microservice apis for HAX webcomponents repo that are shared infrastructure calls. An unauthenticated information disclosure vulnerability exists in the Penn State University deployment of the HAX content management system via the `haxPsuUsage` API endpoint, related to a flat present in open-apis versions up to and including 10.0.2. This allows any remote unauthenticated user to retrieve a full list of PSU websites hosted on HAX CMS. When chained with other authorization issues (e.g., HAX-3), this could assist in targeted attacks such as unauthorized content modification or deletion. Commit 06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7 patches the vulnerability." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T20:15Z", + "lastModifiedDate" : "2025-06-02T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48387", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mafintosh/tar-fs/commit/647447b572bc135c41035e82ca7b894f02b17f0f", + "name" : "https://github.com/mafintosh/tar-fs/commit/647447b572bc135c41035e82ca7b894f02b17f0f", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-8cj5-5rvv-wf4v", + "name" : "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-8cj5-5rvv-wf4v", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.0.9, 2.1.3, and 1.16.5 have an issue where an extract can write outside the specified dir with a specific tarball. This has been patched in versions 3.0.9, 2.1.3, and 1.16.5. As a workaround, use the ignore option to ignore non files/directories." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T20:15Z", + "lastModifiedDate" : "2025-06-02T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47585", + "ASSIGNER" : "audit@patchstack.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://patchstack.com/database/wordpress/plugin/booking-and-rental-manager-for-woocommerce/vulnerability/wordpress-booking-and-rental-manager-2-3-8-broken-access-control-vulnerability?_s_id=cve", + "name" : "https://patchstack.com/database/wordpress/plugin/booking-and-rental-manager-for-woocommerce/vulnerability/wordpress-booking-and-rental-manager-2-3-8-broken-access-control-vulnerability?_s_id=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Missing Authorization vulnerability in Mage people team Booking and Rental Manager allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Booking and Rental Manager: from n/a through 2.3.8." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T20:15Z", + "lastModifiedDate" : "2025-06-02T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-49069", + "ASSIGNER" : "audit@patchstack.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-352" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://patchstack.com/database/wordpress/plugin/contact-forms/vulnerability/wordpress-contact-forms-by-cimatti-plugin-1-9-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "name" : "https://patchstack.com/database/wordpress/plugin/contact-forms/vulnerability/wordpress-contact-forms-by-cimatti-plugin-1-9-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Cross Site Request Forgery.This issue affects Contact Forms by Cimatti: from n/a through 1.9.8." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T19:15Z", + "lastModifiedDate" : "2025-06-02T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-23105", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23105/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23105/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T19:15Z", + "lastModifiedDate" : "2025-06-03T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-23099", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23099/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23099/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T19:15Z", + "lastModifiedDate" : "2025-06-03T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1051", + "ASSIGNER" : "zdi-disclosures@trendmicro.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-122" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-311/", + "name" : "ZDI-25-311", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of ALAC data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25865." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T19:15Z", + "lastModifiedDate" : "2025-06-02T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5086", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code execution." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-03T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-45387", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/osTicket/osTicket", + "name" : "https://github.com/osTicket/osTicket", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/osTicket/osTicket/pull/6802/commits/ab6672faa0991de305d4b90a3faa2e3cebdd23c8", + "name" : "https://github.com/osTicket/osTicket/pull/6802/commits/ab6672faa0991de305d4b90a3faa2e3cebdd23c8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/UmerAdeemCheema/CVE-Security-Research/blob/main/OSTicket/Unauthorized%20Access%20to%20Ajax%20Functions.md", + "name" : "https://github.com/UmerAdeemCheema/CVE-Security-Research/blob/main/OSTicket/Unauthorized%20Access%20to%20Ajax%20Functions.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "osTicket prior to v1.17.6 and v1.18.2 are vulnerable to Broken Access Control Vulnerability in /scp/ajax.php." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-02T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27956", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/intruderlabs/cvex/blob/main/Pixeon/WebLaudos/Directory-Traversal/README.md", + "name" : "https://github.com/intruderlabs/cvex/blob/main/Pixeon/WebLaudos/Directory-Traversal/README.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Directory Traversal vulnerability in WebLaudos 24.2 (04) allows a remote attacker to obtain sensitive information via the id parameter." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-02T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27955", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", + "name" : "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Clinical Collaboration Platform 12.2.1.5 has a weak logout system where the session token remains valid after logout and allows a remote attacker to obtain sensitive information and execute arbitrary code." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-02T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27954", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", + "name" : "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://portswigger.net/kb/issues/00500700_session-token-in-url", + "name" : "https://portswigger.net/kb/issues/00500700_session-token-in-url", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue in Clinical Collaboration Platform 12.2.1.5 allows a remote attacker to obtain sensitive information and execute arbitrary code via the usertoken function of default.aspx." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-02T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27953", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", + "name" : "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue in Clinical Collaboration Platform 12.2.1.5 allows a remote attacker to obtain sensitive information and execute arbitrary code via the session management component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-02T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-23104", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23104/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23104/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. A Use-After-Free in the mobile processor leads to privilege escalation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-02T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20298", + "ASSIGNER" : "psirt@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-732" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://advisory.splunk.com/advisories/SVD-2025-0602", + "name" : "https://advisory.splunk.com/advisories/SVD-2025-0602", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In Universal Forwarder for Windows versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory (by default, C:\\Program Files\\SplunkUniversalForwarder). This lets non-administrator users on the machine access the directory and all its contents." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.0, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 2.1, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-02T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20297", + "ASSIGNER" : "psirt@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://advisory.splunk.com/advisories/SVD-2025-0601", + "name" : "https://advisory.splunk.com/advisories/SVD-2025-0601", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In Splunk Enterprise versions below 9.4.2, 9.3.4 and 9.2.6, and Splunk Cloud Platform versions below 9.3.2411.102, 9.3.2408.111 and 9.2.2406.118, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload through the pdfgen/render REST endpoint that could result in execution of unauthorized JavaScript code in the browser of a user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-02T18:15Z", + "lastModifiedDate" : "2025-06-02T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5036", + "ASSIGNER" : "psirt@autodesk.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0009", + "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0009", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A maliciously crafted RFA file, when linked or imported into Autodesk Revit, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T17:15Z", + "lastModifiedDate" : "2025-06-02T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48995", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-208" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/XML-Security/signxml/commit/1b501faaacf34cf978a52dbc6915ec11e27611cd", + "name" : "https://github.com/XML-Security/signxml/commit/1b501faaacf34cf978a52dbc6915ec11e27611cd", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/XML-Security/signxml/security/advisories/GHSA-gmhf-gg8w-jw42", + "name" : "https://github.com/XML-Security/signxml/security/advisories/GHSA-gmhf-gg8w-jw42", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), versions of SignXML prior to 4.0.4 are vulnerable to a potential timing attack. The verifier may leak information about the correct HMAC when comparing it with the user supplied hash, allowing users to reconstruct the correct HMAC for any data." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T17:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48994", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-303" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/XML-Security/signxml/commit/e3c0c2b82a3329a65d917830657649c98b8c7600", + "name" : "https://github.com/XML-Security/signxml/commit/e3c0c2b82a3329a65d917830657649c98b8c7600", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/XML-Security/signxml/security/advisories/GHSA-6vx8-pcwv-xhf4", + "name" : "https://github.com/XML-Security/signxml/security/advisories/GHSA-6vx8-pcwv-xhf4", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), versions of SignXML prior to 4.0.4 are vulnerable to a potential algorithm confusion attack. Unless the user explicitly limits the expected signature algorithms using the `signxml.XMLVerifier.verify(expect_config=...)` setting, an attacker may supply a signature unexpectedly signed with a key other than the provided HMAC key, using a different (asymmetric key) signature algorithm. Starting with SignXML 4.0.4, specifying `hmac_key` causes the set of accepted signature algorithms to be restricted to HMAC only, if not already restricted by the user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T17:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-8008", + "ASSIGNER" : "security@wso2.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178/", + "name" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3178/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A reflected cross-site scripting (XSS) vulnerability exists in multiple [Vendor Name] products due to insufficient output encoding in error messages generated by the JDBC user store connection validation request. A malicious actor can inject a specially crafted payload into the request, causing the browser to execute arbitrary JavaScript in the context of the vulnerable page.\n\nThis vulnerability may allow UI manipulation, redirection to malicious websites, or data exfiltration from the browser. However, since all session-related sensitive cookies are protected with the httpOnly flag, session hijacking is not possible." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-7074", + "ASSIGNER" : "security@wso2.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566/", + "name" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2024-3566/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the server.\n\nBy leveraging this vulnerability, an attacker could upload a specially crafted payload, potentially achieving remote code execution (RCE) on the server. Exploitation requires valid admin credentials, limiting its impact to authorized but potentially malicious users." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-7073", + "ASSIGNER" : "security@wso2.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3562", + "name" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3562", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A server-side request forgery (SSRF) vulnerability exists in multiple WSO2 products due to improper input validation in SOAP admin services. This flaw allows unauthenticated attackers to manipulate server-side requests, enabling access to internal and external resources available through the network or filesystem.\n\nExploitation of this vulnerability could lead to unauthorized access to sensitive data and systems, including resources within private networks, as long as they are reachable by the affected product." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-3509", + "ASSIGNER" : "security@wso2.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2701", + "name" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-2701", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section.\nTo exploit this vulnerability, a malicious actor must have a valid user account with administrative access to the Management Console. If successful, the actor could inject persistent JavaScript payloads, enabling the theft of user data or execution of unauthorized actions on behalf of other users.\n\nWhile this issue enables persistent client-side script execution, session-related cookies remain protected with the httpOnly flag, preventing session hijacking." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-1440", + "ASSIGNER" : "security@wso2.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3171/", + "name" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3171/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users to an attacker-controlled site.\n\nBy exploiting this vulnerability, an attacker may trick users into visiting a malicious page, enabling phishing attacks to harvest sensitive information or perform other harmful actions." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48941", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1230" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mybb/mybb/commit/b8cc332a27e145c33effaccec90e23c103ae5193", + "name" : "https://github.com/mybb/mybb/commit/b8cc332a27e145c33effaccec90e23c103ae5193", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/mybb/mybb/security/advisories/GHSA-f847-57xc-ffwr", + "name" : "https://github.com/mybb/mybb/security/advisories/GHSA-f847-57xc-ffwr", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://mybb.com/versions/1.8.39", + "name" : "https://mybb.com/versions/1.8.39", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "MyBB is free and open source forum software. Prior to version 1.8.39, the search component does not validate permissions correctly, which allows attackers to determine the existence of hidden (draft, unapproved, or soft-deleted) threads containing specified text in the title. The visibility state (`mybb_threads.visible` integer column) of threads is not validated in internal search queries, whose result is used to output a general success or failure of the search. While MyBB validates permissions when displaying the final search results, a search operation that internally produces at least one result outputs a redirect response (as a HTTP redirect, or a success message page with delayed redirect, depending on configuration). On the other hand, a search operation that internally produces no results outputs a corresponding message in the response without a redirect. This allows a user to determine whether threads matching title search parameters exist, including draft threads (`visible` with a value of `-2`), soft-deleted threads (`visible` with a value of `-1`), and unapproved threads (`visible` with a value of `0`); in addition to displaying generally visible threads (`visible` with a value of `1`). This vulnerability does not affect other layers of permissions. In order to exploit the vulnerability, the user must have access to the search functionality, and general access to forums containing the thread(s). The vulnerability does not expose the message content of posts. MyBB 1.8.39 resolves this issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48940", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mybb/mybb/commit/6e6cfbd524d9101b51e1278ecf520479b64b0f00", + "name" : "https://github.com/mybb/mybb/commit/6e6cfbd524d9101b51e1278ecf520479b64b0f00", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/mybb/mybb/security/advisories/GHSA-q4jv-xwjx-37cp", + "name" : "https://github.com/mybb/mybb/security/advisories/GHSA-q4jv-xwjx-37cp", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://mybb.com/versions/1.8.39", + "name" : "https://mybb.com/versions/1.8.39", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "MyBB is free and open source forum software. Prior to version 1.8.39, the upgrade component does not validate user input properly, which allows attackers to perform local file inclusion (LFI) via a specially crafted parameter value. In order to exploit the vulnerability, the installer must be unlocked (no `install/lock` file present) and the upgrade script must be accessible (by re-installing the forum via access to `install/index.php`; when the forum has not yet been installed; or the attacker is authenticated as a forum administrator). MyBB 1.8.39 resolves this issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48866", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1050" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/owasp-modsecurity/ModSecurity/commit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e", + "name" : "https://github.com/owasp-modsecurity/ModSecurity/commit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r", + "name" : "https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-f82j-8pp7-cw2w", + "name" : "https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-f82j-8pp7-cw2w", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/owasp-modsecurity/ModSecurity/wiki/Reference-Manual-(v2.x)#sanitisearg", + "name" : "https://github.com/owasp-modsecurity/ModSecurity/wiki/Reference-Manual-(v2.x)#sanitisearg", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-45542", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mathurvishal/CloudClassroom-PHP-Project", + "name" : "https://github.com/mathurvishal/CloudClassroom-PHP-Project", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://medium.com/@sanjay70023/cve-2025-45542-time-based-blind-sql-injection-in-cloudclassroom-php-project-v1-0-1fa0efc8a94a", + "name" : "https://medium.com/@sanjay70023/cve-2025-45542-time-based-blind-sql-injection-in-cloudclassroom-php-project-v1-0-1fa0efc8a94a", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SQL injection vulnerability in the registrationform endpoint of CloudClassroom-PHP-Project v1.0. The pass parameter is vulnerable due to improper input validation, allowing attackers to inject SQL queries." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-44115", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/yA0-Z/9666b1a333607381ab8dfcc137f2b65c", + "name" : "https://gist.github.com/yA0-Z/9666b1a333607381ab8dfcc137f2b65c", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Cotonti/Cotonti/issues/1650", + "name" : "https://github.com/Cotonti/Cotonti/issues/1650", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Cotonti/Cotonti/issues/1834", + "name" : "https://github.com/Cotonti/Cotonti/issues/1834", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in Cotonti Siena v0.9.25. Affected by this vulnerability is the file /admin.php?m=config&n=edit&o=core&p=title. The manipulation of the value of title leads to cross-site scripting." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-57459", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/b0mk35h/921cfa00f9ea1af66645574537d38587", + "name" : "https://gist.github.com/b0mk35h/921cfa00f9ea1af66645574537d38587", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://owasp.org/www-community/attacks/SQL_Injection", + "name" : "https://owasp.org/www-community/attacks/SQL_Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A time-based SQL injection vulnerability exists in mydetailsstudent.php in the CloudClassroom PHP Project 1.0. The myds parameter does not properly validate user input, allowing an attacker to inject arbitrary SQL commands." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-40114", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads", + "name" : "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40114", + "name" : "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40114", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Cross Site Scripting (XSS) vulnerability in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before allows an attacker to manipulate the language cookie to inject malicious JavaScript code." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-40113", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads", + "name" : "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40113", + "name" : "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40113", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Sitecom WLX-2006 Wall Mount Range Extender N300 v.1.5 and before is vulnerable to Use of Default Credentials." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-40112", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads", + "name" : "http://www.sitecomlearningcentre.com/products/wlx-2006v1001/wi-fi-range-extender-n300/downloads", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40112", + "name" : "https://github.com/Emm448/vulnerability-research/tree/main/CVE-2024-40112", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Local File Inclusion (LFI) vulnerability exists in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before, which allows an attacker to manipulate the \"language\" cookie to include arbitrary files from the server. This vulnerability can be exploited to disclose sensitive information." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T16:15Z", + "lastModifiedDate" : "2025-06-02T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-44172", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/hcxj/Tenda-Vul/blob/main/setSmartPowerManagement.md", + "name" : "https://github.com/hcxj/Tenda-Vul/blob/main/setSmartPowerManagement.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Tenda AC6 V15.03.05.16 was discovered to contain a stack overflow via the time parameter in the setSmartPowerManagement function." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T15:15Z", + "lastModifiedDate" : "2025-06-02T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37096", + "ASSIGNER" : "security-alert@hpe.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "name" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A command injection remote code execution vulnerability exists in HPE StoreOnce Software." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T15:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37095", + "ASSIGNER" : "security-alert@hpe.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "name" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A directory traversal information disclosure vulnerability exists in HPE StoreOnce Software." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T15:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20001", + "ASSIGNER" : "talos-cna@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2157", + "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2157", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2157", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2157", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An out-of-bounds read vulnerability exists in High-Logic FontCreator 15.0.0.3015. A specially crafted font file can trigger this vulnerability which can lead to disclosure of sensitive information. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T15:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-54028", + "ASSIGNER" : "talos-cna@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2132", + "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2132", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2132", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2132", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An integer underflow vulnerability exists in the OLE Document DIFAT Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T15:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-52035", + "ASSIGNER" : "talos-cna@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2131", + "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2131", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2131", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2131", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T15:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-48877", + "ASSIGNER" : "talos-cna@cisco.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2128", + "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2128", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2128", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A memory corruption vulnerability exists in the Shared String Table Record Parser implementation in xls2csv utility version 0.95. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T15:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5447", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-78" + }, { + "lang" : "en", + "value" : "CWE-77" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_10/10.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_10/10.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310786", + "name" : "VDB-310786 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310786", + "name" : "VDB-310786 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 ssid1MACFilter os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584369", + "name" : "Submit #584369 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been declared as critical. This vulnerability affects the function ssid1MACFilter of the file /goform/ssid1MACFilter. The manipulation of the argument apselect_%d/newap_text_%d leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T14:15Z", + "lastModifiedDate" : "2025-06-02T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37094", + "ASSIGNER" : "security-alert@hpe.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "name" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A directory traversal arbitrary file deletion vulnerability exists in HPE StoreOnce Software." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37093", + "ASSIGNER" : "security-alert@hpe.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "name" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An authentication bypass vulnerability exists in HPE StoreOnce Software." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37092", + "ASSIGNER" : "security-alert@hpe.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "name" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A command injection remote code execution vulnerability exists in HPE StoreOnce Software." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37091", + "ASSIGNER" : "security-alert@hpe.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "name" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A command injection remote code execution vulnerability exists in HPE StoreOnce Software." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37090", + "ASSIGNER" : "security-alert@hpe.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "name" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A server-side request forgery vulnerability exists in HPE StoreOnce Software." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37089", + "ASSIGNER" : "security-alert@hpe.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "name" : "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A command injection remote code execution vulnerability exists in HPE StoreOnce Software." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-57783", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://dotapp.uk", + "name" : "https://dotapp.uk", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/alexpinel/Dot/issues/28", + "name" : "https://github.com/alexpinel/Dot/issues/28", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/EDMPL/Vulnerability-Research/tree/main/CVE-2024-57783", + "name" : "https://github.com/EDMPL/Vulnerability-Research/tree/main/CVE-2024-57783", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The desktop application in Dot through 0.9.3 allows XSS and resultant command execution because user input and LLM output are appended to the DOM with innerHTML (in render.js), and because the Electron window can access Node.js APIs." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5446", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-78" + }, { + "lang" : "en", + "value" : "CWE-77" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_9/9.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_9/9.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310785", + "name" : "VDB-310785 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310785", + "name" : "VDB-310785 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_checkCredentialsByBBS os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584368", + "name" : "Submit #584368 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been classified as critical. This affects the function RP_checkCredentialsByBBS of the file /goform/RP_checkCredentialsByBBS. The manipulation of the argument pwd leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T13:15Z", + "lastModifiedDate" : "2025-06-02T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5445", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_8/8.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310784", + "name" : "VDB-310784 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310784", + "name" : "VDB-310784 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_checkFWByBBS os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584367", + "name" : "Submit #584367 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this issue is the function RP_checkFWByBBS of the file /goform/RP_checkFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T13:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48745", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-49113. Reason: This candidate is a reservation duplicate of CVE-2025-49113. Notes: All CVE users should reference CVE-2025-49113 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T13:15Z", + "lastModifiedDate" : "2025-06-02T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46806", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-823" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46806", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46806", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/yrutschle/sslh/releases/tag/v2.2.4", + "name" : "https://github.com/yrutschle/sslh/releases/tag/v2.2.4", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Use of Out-of-range Pointer Offset vulnerability in sslh leads to denial of service on some architectures.This issue affects sslh before 2.2.4." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T13:15Z", + "lastModifiedDate" : "2025-06-02T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-26396", + "ASSIGNER" : "psirt@solarwinds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-269" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://documentation.solarwinds.com/en/success_center/dameware/content/release_notes/dameware_12-3-2_release_notes.htm", + "name" : "https://documentation.solarwinds.com/en/success_center/dameware/content/release_notes/dameware_12-3-2_release_notes.htm", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26396", + "name" : "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26396", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The SolarWinds Dameware Mini Remote Control was determined to be affected by Incorrect Permissions Local Privilege Escalation Vulnerability. This vulnerability requires local access and a valid low privilege account to be susceptible to this vulnerability." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-02T13:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-12168", + "ASSIGNER" : "browser-security@yandex-team.ru" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://yandex.com/bugbounty/i/hall-of-fame-products", + "name" : "https://yandex.com/bugbounty/i/hall-of-fame-products", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Yandex Telemost for Desktop before 2.7.0 has a DLL Hijacking Vulnerability because an untrusted search path is used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T13:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5444", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_7/7.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_7/7.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_7/7.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_7/7.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310783", + "name" : "VDB-310783 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310783", + "name" : "VDB-310783 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_UpgradeFWByBBS os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584366", + "name" : "Submit #584366 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 and classified as critical. Affected by this vulnerability is the function RP_UpgradeFWByBBS of the file /goform/RP_UpgradeFWByBBS. The manipulation of the argument type/ch/ssidhex/security/extch/pwd/mode/ip/nm/gw leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T12:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5443", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_6/6.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310782", + "name" : "VDB-310782 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310782", + "name" : "VDB-310782 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 wirelessAdvancedHidden os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584365", + "name" : "Submit #584365 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T12:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48990", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-122" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/nekernel-org/nekernel/commit/fb7b7f658327f659c6a6da1af151cb389c2ca4ee", + "name" : "https://github.com/nekernel-org/nekernel/commit/fb7b7f658327f659c6a6da1af151cb389c2ca4ee", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/nekernel-org/nekernel/security/advisories/GHSA-jvvh-fp57-2p32", + "name" : "https://github.com/nekernel-org/nekernel/security/advisories/GHSA-jvvh-fp57-2p32", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "NeKernal is a free and open-source operating system stack. Version 0.0.2 has a 1-byte heap overflow in `rt_copy_memory`, which unconditionally wrote a null terminator at `dst[len]`. When `len` equals the size of the destination buffer (256 bytes), that extra `'\\0'` write overruns the buffer by one byte. To avoid breaking existing callers or changing the public API, the patch in commit fb7b7f658327f659c6a6da1af151cb389c2ca4ee takes a minimal approach: it simply removes the overflow-causing line without adding bounds checks or altering the function signature." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T12:15Z", + "lastModifiedDate" : "2025-06-02T12:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48958", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/froxlor/Froxlor/commit/fde43f80600f1035e1e3d2297411b666d805549a", + "name" : "https://github.com/froxlor/Froxlor/commit/fde43f80600f1035e1e3d2297411b666d805549a", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/froxlor/Froxlor/security/advisories/GHSA-26xq-m8xw-6373", + "name" : "https://github.com/froxlor/Froxlor/security/advisories/GHSA-26xq-m8xw-6373", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/froxlor/Froxlor/security/advisories/GHSA-26xq-m8xw-6373", + "name" : "https://github.com/froxlor/Froxlor/security/advisories/GHSA-26xq-m8xw-6373", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/assets/86947633-3e7c-4e10-86cc-92e577761e8e", + "name" : "https://github.com/user-attachments/assets/86947633-3e7c-4e10-86cc-92e577761e8e", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Froxlor is open source server administration software. Prior to version 2.2.6, an HTML Injection vulnerability in the customer account portal allows an attacker to inject malicious HTML payloads in the email section. This can lead to phishing attacks, credential theft, and reputational damage by redirecting users to malicious external websites. The vulnerability has a medium severity, as it can be exploited through user input without authentication. Version 2.2.6 fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T12:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48957", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/AstrBotDevs/AstrBot/commit/cceadf222c46813c7f41115b40d371e7eb91e492", + "name" : "https://github.com/AstrBotDevs/AstrBot/commit/cceadf222c46813c7f41115b40d371e7eb91e492", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/AstrBotDevs/AstrBot/issues/1675", + "name" : "https://github.com/AstrBotDevs/AstrBot/issues/1675", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/AstrBotDevs/AstrBot/pull/1676", + "name" : "https://github.com/AstrBotDevs/AstrBot/pull/1676", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/AstrBotDevs/AstrBot/security/advisories/GHSA-cq37-g2qp-3c2p", + "name" : "https://github.com/AstrBotDevs/AstrBot/security/advisories/GHSA-cq37-g2qp-3c2p", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/AstrBotDevs/AstrBot/security/advisories/GHSA-cq37-g2qp-3c2p", + "name" : "https://github.com/AstrBotDevs/AstrBot/security/advisories/GHSA-cq37-g2qp-3c2p", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a workaround, users can edit the `cmd_config.json` file to disable the dashboard feature as a temporary workaround. However, it is strongly recommended to upgrade to version v3.5.13 or later to fully resolve this issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T12:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48955", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-532" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Erudika/para/commit/1e8a89558542854bb0683ab234c4429ad93b0835", + "name" : "https://github.com/Erudika/para/commit/1e8a89558542854bb0683ab234c4429ad93b0835", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Erudika/para/security/advisories/GHSA-v75g-77vf-6jjq", + "name" : "https://github.com/Erudika/para/security/advisories/GHSA-v75g-77vf-6jjq", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 exposes both access and secret keys in logs without redaction. These credentials are later reused in variable assignments for persistence but do not require logging for debugging or system health purposes. Version 1.50.8 fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T12:15Z", + "lastModifiedDate" : "2025-06-02T12:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48495", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-87" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Forceu/Gokapi/commit/65ddbc68fbfdf1c80cadb477f4bcbb7f2c4fdbf8", + "name" : "https://github.com/Forceu/Gokapi/commit/65ddbc68fbfdf1c80cadb477f4bcbb7f2c4fdbf8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Forceu/Gokapi/security/advisories/GHSA-4xg4-54hm-9j77", + "name" : "https://github.com/Forceu/Gokapi/security/advisories/GHSA-4xg4-54hm-9j77", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. By renaming the friendly name of an API key, an authenticated user could inject JS into the API key overview, which would also be executed when another user clicks on his API tab. Prior to version 2.0.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users of versions prior to 2.0.0. If a user is the only authenticated user using Gokapi, they are not affected. This issue has been fixed in v2.0.0. A workaround would be to not open the API page if it is possible that another user might have injected code." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T12:15Z", + "lastModifiedDate" : "2025-06-02T12:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46807", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-770" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46807", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46807", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/yrutschle/sslh/releases/tag/v2.2.4", + "name" : "https://github.com/yrutschle/sslh/releases/tag/v2.2.4", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Allocation of Resources Without Limits or Throttling vulnerability in sslh allows attackers to easily exhaust the file descriptors in sslh and deny legitimate users service.This issue affects sslh before 2.2.4." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T12:15Z", + "lastModifiedDate" : "2025-06-02T12:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5442", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_5/5.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_5/5.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_5/5.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_5/5.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310781", + "name" : "VDB-310781 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310781", + "name" : "VDB-310781 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 RP_pingGatewayByBBS os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584364", + "name" : "Submit #584364 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This issue affects the function RP_pingGatewayByBBS of the file /goform/RP_pingGatewayByBBS. The manipulation of the argument ip/nm/gw leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5441", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-78" + }, { + "lang" : "en", + "value" : "CWE-77" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_4/4.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_4/4.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310780", + "name" : "VDB-310780 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310780", + "name" : "VDB-310780 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 setDeviceURL os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584363", + "name" : "Submit #584363 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function setDeviceURL of the file /goform/setDeviceURL. The manipulation of the argument DeviceURL leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48494", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-87" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Forceu/Gokapi/commit/343cc566cfd7f4efcd522c92371561d494aed6b0", + "name" : "https://github.com/Forceu/Gokapi/commit/343cc566cfd7f4efcd522c92371561d494aed6b0", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Forceu/Gokapi/releases/tag/v2.0.0", + "name" : "https://github.com/Forceu/Gokapi/releases/tag/v2.0.0", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Forceu/Gokapi/security/advisories/GHSA-95rc-wc32-gm53", + "name" : "https://github.com/Forceu/Gokapi/security/advisories/GHSA-95rc-wc32-gm53", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. When using end-to-end encryption, a stored cross-site scripting vulnerability can be exploited by uploading a file with JavaScript code embedded in the filename. After upload and every time someone opens the upload list, the script is then parsed. Prior to version 2.0.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users using a version prior to 2.0.0. If a user is the only authenticated user using Gokapi, they are not affected. This issue has been fixed in v2.0.0. A possible workaround would be to disable end-to-end encryption." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47289", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://drive.google.com/file/d/1uQAEjewSL9jWWu1UHe47tAnM7U4_x39g/view?usp=drive_link", + "name" : "https://drive.google.com/file/d/1uQAEjewSL9jWWu1UHe47tAnM7U4_x39g/view?usp=drive_link", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj", + "name" : "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj", + "name" : "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "CE Phoenix is a free, open-source eCommerce platform. A stored cross-site scripting (XSS) vulnerability was discovered in CE Phoenix versions 1.0.9.9 through 1.1.0.2 where an attacker can inject malicious JavaScript into the testimonial description field. Once submitted, if the shop owner (admin) approves the testimonial, the script executes in the context of any user visiting the testimonial page. Because the session cookies are not marked with the `HttpOnly` flag, they can be exfiltrated by the attacker — potentially leading to account takeover. Version 1.1.0.3 fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47272", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-306" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/CE-PhoenixCart/PhoenixCart/commit/e87162b15d31c4126acfc1aad6108e5b9955bb76", + "name" : "https://github.com/CE-PhoenixCart/PhoenixCart/commit/e87162b15d31c4126acfc1aad6108e5b9955bb76", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-62qj-pvwm-h8cv", + "name" : "https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-62qj-pvwm-h8cv", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The CE Phoenix eCommerce platform, starting in version 1.0.9.7 and prior to version 1.1.0.3, allowed logged-in users to delete their accounts without requiring password re-authentication. An attacker with temporary access to an authenticated session (e.g., on a shared/public machine) could permanently delete the user’s account without knowledge of the password. This bypass of re-authentication puts users at risk of account loss and data disruption. Version 1.1.0.3 contains a patch for the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T11:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3454", + "ASSIGNER" : "security@grafana.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://grafana.com/security/security-advisories/cve-2025-3454/", + "name" : "https://grafana.com/security/security-advisories/cve-2025-3454/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.\n\nUsers with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.\n\nThe issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-29785", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-248" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/quic-go/quic-go/commit/b90058aba5f65f48e0e150c89bbaa21a72dda4de", + "name" : "https://github.com/quic-go/quic-go/commit/b90058aba5f65f48e0e150c89bbaa21a72dda4de", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/quic-go/quic-go/issues/4981", + "name" : "https://github.com/quic-go/quic-go/issues/4981", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/quic-go/quic-go/security/advisories/GHSA-j972-j939-p2v3", + "name" : "https://github.com/quic-go/quic-go/security/advisories/GHSA-j972-j939-p2v3", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "quic-go is an implementation of the QUIC protocol in Go. The loss recovery logic for path probe packets that was added in the v0.50.0 release can be used to trigger a nil-pointer dereference by a malicious QUIC client. In order to do so, the attacker first sends valid QUIC packets from different remote addresses (thereby triggering the newly added path validation logic: the server sends path probe packets), and then sending ACKs for packets received from the server specifically crafted to trigger the nil-pointer dereference. v0.50.1 contains a patch that fixes the vulnerability. This release contains a test that generates random sequences of sent packets (both regular and path probe packets), that was used to verify that the patch actually covers all corner cases. No known workarounds are available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1246", + "ASSIGNER" : "arm-security@arm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://developer.arm.com/documentation/110466/latest/", + "name" : "https://developer.arm.com/documentation/110466/latest/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to access outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r18p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r28p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p3, from r50p0 through r54p0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-0819", + "ASSIGNER" : "arm-security@arm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://developer.arm.com/documentation/110466/latest/", + "name" : "https://developer.arm.com/documentation/110466/latest/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform valid GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r44p0 through r49p3, from r50p0 through r51p0; Valhall GPU Kernel Driver: from r44p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r44p0 through r49p3, from r50p0 through r54p0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-0073", + "ASSIGNER" : "arm-security@arm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://developer.arm.com/documentation/110466/latest/", + "name" : "https://developer.arm.com/documentation/110466/latest/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 before r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 before r54p0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T11:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5440", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-78" + }, { + "lang" : "en", + "value" : "CWE-77" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_3/3.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_3/3.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310779", + "name" : "VDB-310779 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310779", + "name" : "VDB-310779 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 NTP os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584362", + "name" : "Submit #584362 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This affects the function NTP of the file /goform/NTP. The manipulation of the argument manual_year_select/manual_month_select/manual_day_select/manual_hour_select/manual_min_select/manual_sec_select leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T10:15Z", + "lastModifiedDate" : "2025-06-02T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5439", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-78" + }, { + "lang" : "en", + "value" : "CWE-77" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_2/2.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_2/2.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310778", + "name" : "VDB-310778 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310778", + "name" : "VDB-310778 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 verifyFacebookLike os command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584361", + "name" : "Submit #584361 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been rated as critical. Affected by this issue is the function verifyFacebookLike of the file /goform/verifyFacebookLike. The manipulation of the argument uid/accessToken leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T10:15Z", + "lastModifiedDate" : "2025-06-02T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3260", + "ASSIGNER" : "security@grafana.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://grafana.com/security/security-advisories/CVE-2025-3260/", + "name" : "https://grafana.com/security/security-advisories/CVE-2025-3260/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1).\n\nImpact:\n\n- Viewers can view all dashboards/folders regardless of permissions\n\n- Editors can view/edit/delete all dashboards/folders regardless of permissions\n\n- Editors can create dashboards in any folder regardless of permissions\n\n- Anonymous users with viewer/editor roles are similarly affected\n\nOrganization isolation boundaries remain intact. The vulnerability only affects dashboard access and does not grant access to datasources." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T10:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1750", + "ASSIGNER" : "security@huntr.dev" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/run-llama/llama_index/commit/369a2942df2efcf6b74461c45d20a0af1fbe4ae2", + "name" : "https://github.com/run-llama/llama_index/commit/369a2942df2efcf6b74461c45d20a0af1fbe4ae2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://huntr.com/bounties/e1302233-9180-4269-9047-1526247d2cd8", + "name" : "https://huntr.com/bounties/e1302233-9180-4269-9047-1526247d2cd8", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An SQL injection vulnerability exists in the delete function of DuckDBVectorStore in run-llama/llama_index version v0.12.19. This vulnerability allows an attacker to manipulate the ref_doc_id parameter, enabling them to read and write arbitrary files on the server, potentially leading to remote code execution (RCE)." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T10:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5455", + "ASSIGNER" : "security@qt.io" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://codereview.qt-project.org/c/qt/qtbase/+/642006", + "name" : "https://codereview.qt-project.org/c/qt/qtbase/+/642006", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code.\n\nIf the function was called with malformed data, for example, an URL that\ncontained a \"charset\" parameter that lacked a value (such as\n\"data:charset,\"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service\n(abort).\n\nThis impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T09:15Z", + "lastModifiedDate" : "2025-06-02T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5438", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-77" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_1/1.md", + "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_1/1.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310777", + "name" : "VDB-310777 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310777", + "name" : "VDB-310777 | Linksys RE6500/RE6250/RE6300/RE6350/RE7000/RE9000 WPS command injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584360", + "name" : "Submit #584360 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Remote Command Execution", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.linksys.com/", + "name" : "https://www.linksys.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been declared as critical. Affected by this vulnerability is the function WPS of the file /goform/WPS. The manipulation of the argument PIN leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T09:15Z", + "lastModifiedDate" : "2025-06-02T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5437", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-287" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/DefaultCh40s/RE016/blob/main/re016.py", + "name" : "https://github.com/DefaultCh40s/RE016/blob/main/re016.py", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310770", + "name" : "VDB-310770 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310770", + "name" : "VDB-310770 | Multilaser Sirius RE016 Password Change cstecgi.cgi improper authentication", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584325", + "name" : "Submit #584325 | Multilaser Sirius RE016 MLT1.0 Authentication Bypass", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in Multilaser Sirius RE016 MLT1.0. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi of the component Password Change Handler. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-02T09:15Z", + "lastModifiedDate" : "2025-06-02T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5436", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-200" + }, { + "lang" : "en", + "value" : "CWE-284" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/DefaultCh40s/RE016/blob/main/re016.py", + "name" : "https://github.com/DefaultCh40s/RE016/blob/main/re016.py", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310769", + "name" : "VDB-310769 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310769", + "name" : "VDB-310769 | Multilaser Sirius RE016 cstecgi.cgi information disclosure", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584324", + "name" : "Submit #584324 | Multilaser Sirius RE016 MLT1.0 Information Disclosure", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Multilaser Sirius RE016 MLT1.0. It has been rated as problematic. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-02T08:15Z", + "lastModifiedDate" : "2025-06-02T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5435", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20Marwal%20Infotech%20v1.0.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20Marwal%20Infotech%20v1.0.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310768", + "name" : "VDB-310768 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310768", + "name" : "VDB-310768 | Marwal Infotech CMS page.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584262", + "name" : "Submit #584262 | https://marwalinfotech.com/ Marwal Infotech v1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Marwal Infotech CMS 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /page.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T08:15Z", + "lastModifiedDate" : "2025-06-02T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5113", + "ASSIGNER" : "research@onekey.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.onekey.com/resource/security-advisory-remote-code-execution-on-diviotec-ip-camera-cve-2025-5113", + "name" : "https://www.onekey.com/resource/security-advisory-remote-code-execution-on-diviotec-ip-camera-cve-2025-5113", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Diviotec professional series exposes a web interface. One endpoint is vulnerable to arbitrary command injection and hardcoded passwords are used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T08:15Z", + "lastModifiedDate" : "2025-06-02T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-0358", + "ASSIGNER" : "product-security@axis.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.axis.com/dam/public/35/90/85/cve-2025-0358pdf-en-US-483809.pdf", + "name" : "https://www.axis.com/dam/public/35/90/85/cve-2025-0358pdf-en-US-483809.pdf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T08:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-0325", + "ASSIGNER" : "product-security@axis.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.axis.com/dam/public/d0/ae/fe/cve-2025-0325pdf-en-US-483808.pdf", + "name" : "https://www.axis.com/dam/public/d0/ae/fe/cve-2025-0325pdf-en-US-483808.pdf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Guard Tour VAPIX API parameter allowed the use of arbitrary values and can be incorrectly called, allowing an attacker to block access to the guard tour configuration page in the web interface of the Axis device." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T08:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-0324", + "ASSIGNER" : "product-security@axis.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.axis.com/dam/public/04/f3/1c/cve-2025-0324pdf-en-US-483807.pdf", + "name" : "https://www.axis.com/dam/public/04/f3/1c/cve-2025-0324pdf-en-US-483807.pdf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The VAPIX Device Configuration framework allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T08:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5434", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20Aem%20Solutions%20CMS%20v1.0.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20Aem%20Solutions%20CMS%20v1.0.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310767", + "name" : "VDB-310767 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310767", + "name" : "VDB-310767 | Aem Solutions CMS page.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584261", + "name" : "Submit #584261 | https://www.aemsolutions.com/ Aem Solutions CMS v1.0 Authorization Bypass Through User-Controlled SQL Primary Key", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Aem Solutions CMS up to 1.0. It has been classified as critical. This affects an unknown part of the file /page.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T07:15Z", + "lastModifiedDate" : "2025-06-02T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5433", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20fengoffice_3.5.1.5.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20fengoffice_3.5.1.5.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310766", + "name" : "VDB-310766 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310766", + "name" : "VDB-310766 | Fengoffice Feng Office index.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584259", + "name" : "Submit #584259 | https://www.fengoffice.com/ fengoffice 3.5.1.5 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Fengoffice Feng Office 3.5.1.5 and classified as critical. Affected by this issue is some unknown functionality of the file /index.php?c=account&a=set_timezone. The manipulation of the argument tz_offset leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T07:15Z", + "lastModifiedDate" : "2025-06-02T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4010", + "ASSIGNER" : "research@onekey.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.onekey.com/resource/security-advisory-remote-command-execution-on-netcomm-ntc-6200-and-nwl-222", + "name" : "https://www.onekey.com/resource/security-advisory-remote-command-execution-on-netcomm-ntc-6200-and-nwl-222", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Netcom NTC 6200 and NWL 222 series expose a web interface to be configured and set up by operators. Multiple endpoints of the web interface are vulnerable to arbitrary command injection and use insecure hardcoded passwords. Remote authenticated attackers can gain arbitrary code execution with elevated privileges." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1235", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-190" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.vde.com/en/advisories/VDE-2025-020", + "name" : "https://cert.vde.com/en/advisories/VDE-2025-020", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-02T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5432", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310765", + "name" : "VDB-310765 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310765", + "name" : "VDB-310765 | AssamLook CMS view_tender.php sql injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in AssamLook CMS 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /view_tender.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T06:15Z", + "lastModifiedDate" : "2025-06-02T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5431", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310764", + "name" : "VDB-310764 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310764", + "name" : "VDB-310764 | AssamLook CMS department-profile.php sql injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in AssamLook CMS 1.0. Affected is an unknown function of the file /department-profile.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T06:15Z", + "lastModifiedDate" : "2025-06-02T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3951", + "ASSIGNER" : "contact@wpscan.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://wpscan.com/vulnerability/220c195f-3df3-4883-8e0b-a0cf019e6323/", + "name" : "https://wpscan.com/vulnerability/220c195f-3df3-4883-8e0b-a0cf019e6323/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wpscan.com/vulnerability/220c195f-3df3-4883-8e0b-a0cf019e6323/", + "name" : "https://wpscan.com/vulnerability/220c195f-3df3-4883-8e0b-a0cf019e6323/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The WP-Optimize WordPress plugin before 4.2.0 does not properly escape user input when checking image compression statuses, which could allow users with the administrator role to conduct SQL Injection attacks in the context of Multi-Site WordPress configurations." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T06:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1485", + "ASSIGNER" : "contact@wpscan.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://wpscan.com/vulnerability/0158eb67-cd36-4406-bf70-6f2be849ec52/", + "name" : "https://wpscan.com/vulnerability/0158eb67-cd36-4406-bf70-6f2be849ec52/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Real Cookie Banner: GDPR & ePrivacy Cookie Consent WordPress plugin before 5.1.6, real-cookie-banner-pro WordPress plugin before 5.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T06:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5430", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "name" : "https://github.com/YZS17/CVE/blob/main/SQL/SQLi%20in%20AssamLook%20CMS-v1.0.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310763", + "name" : "VDB-310763 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310763", + "name" : "VDB-310763 | AssamLook CMS product.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584257", + "name" : "Submit #584257 | https://assamlook.com/ AssamLook CMS v1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in AssamLook CMS 1.0. This issue affects some unknown processing of the file /product.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T05:16Z", + "lastModifiedDate" : "2025-06-02T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5429", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_list_install_plugins.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_list_install_plugins.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310762", + "name" : "VDB-310762 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310762", + "name" : "VDB-310762 | juzaweb CMS Plugins Page install access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584057", + "name" : "Submit #584057 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on “Plugins\" Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in juzaweb CMS up to 3.4.2. This vulnerability affects unknown code of the file /admin-cp/plugin/install of the component Plugins Page. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T05:16Z", + "lastModifiedDate" : "2025-06-02T05:16Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-49113", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/06/02/3", + "name" : "http://www.openwall.com/lists/oss-security/2025/06/02/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://fearsoff.org/research/roundcube", + "name" : "https://fearsoff.org/research/roundcube", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/roundcube/roundcubemail/commit/0376f69e958a8fef7f6f09e352c541b4e7729c4d", + "name" : "https://github.com/roundcube/roundcubemail/commit/0376f69e958a8fef7f6f09e352c541b4e7729c4d", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/roundcube/roundcubemail/commit/7408f31379666124a39f9cb1018f62bc5e2dc695", + "name" : "https://github.com/roundcube/roundcubemail/commit/7408f31379666124a39f9cb1018f62bc5e2dc695", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/roundcube/roundcubemail/commit/c50a07d88ca38f018a0f4a0b008e9a1deb32637e", + "name" : "https://github.com/roundcube/roundcubemail/commit/c50a07d88ca38f018a0f4a0b008e9a1deb32637e", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/roundcube/roundcubemail/pull/9865", + "name" : "https://github.com/roundcube/roundcubemail/pull/9865", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/roundcube/roundcubemail/releases/tag/1.5.10", + "name" : "https://github.com/roundcube/roundcubemail/releases/tag/1.5.10", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/roundcube/roundcubemail/releases/tag/1.6.11", + "name" : "https://github.com/roundcube/roundcubemail/releases/tag/1.6.11", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10", + "name" : "https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T05:15Z", + "lastModifiedDate" : "2025-06-02T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-49112", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-191" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/redis/redis/blob/994bc96bb1744cb153392fc96bdba43eae56e17f/src/networking.c#L783", + "name" : "https://github.com/redis/redis/blob/994bc96bb1744cb153392fc96bdba43eae56e17f/src/networking.c#L783", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/valkey-io/valkey/blob/daea05b1e26db29bfd1c033e27f9d519a2f8ccbb/src/networking.c#L886", + "name" : "https://github.com/valkey-io/valkey/blob/daea05b1e26db29bfd1c033e27f9d519a2f8ccbb/src/networking.c#L886", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/valkey-io/valkey/pull/2101", + "name" : "https://github.com/valkey-io/valkey/pull/2101", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T05:15Z", + "lastModifiedDate" : "2025-06-02T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-25179", + "ASSIGNER" : "security@imgtec.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/", + "name" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory pages." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T05:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5428", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_list_delete_logs.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_list_delete_logs.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_list_delete_logs.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_list_delete_logs.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310761", + "name" : "VDB-310761 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310761", + "name" : "VDB-310761 | juzaweb CMS Error Logs Page log-viewer access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584056", + "name" : "Submit #584056 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on “Error Logs\" Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in juzaweb CMS up to 3.4.2. This affects an unknown part of the file /admin-cp/log-viewer of the component Error Logs Page. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T04:15Z", + "lastModifiedDate" : "2025-06-02T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5427", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_acess_modify_permalinks.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_acess_modify_permalinks.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310760", + "name" : "VDB-310760 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310760", + "name" : "VDB-310760 | juzaweb CMS Permalinks Page permalinks access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584055", + "name" : "Submit #584055 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on \"Permalinks\" Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in juzaweb CMS up to 3.4.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin-cp/permalinks of the component Permalinks Page. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T04:15Z", + "lastModifiedDate" : "2025-06-02T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-11857", + "ASSIGNER" : "cve@cert.org.tw" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-59" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.twcert.org.tw/en/cp-139-10161-fa1b5-2.html", + "name" : "https://www.twcert.org.tw/en/cp-139-10161-fa1b5-2.html", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.twcert.org.tw/tw/cp-132-10160-76012-1.html", + "name" : "https://www.twcert.org.tw/tw/cp-132-10160-76012-1.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Bluetooth HCI Adaptor from Realtek has a Link Following vulnerability. Local attackers with regular privileges can create a symbolic link with the same name as a specific file, causing the product to delete arbitrary files pointed to by the link. Subsequently, attackers can leverage arbitrary file deletion to privilege escalation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-02T04:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5426", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_acess_modify_menu.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_acess_modify_menu.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310759", + "name" : "VDB-310759 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310759", + "name" : "VDB-310759 | juzaweb CMS Menu Page menus access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584054", + "name" : "Submit #584054 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on \"Menu\" Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in juzaweb CMS up to 3.4.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin-cp/menus of the component Menu Page. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5425", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_theme_editing.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_theme_editing.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310758", + "name" : "VDB-310758 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310758", + "name" : "VDB-310758 | juzaweb CMS Theme Editor Page default access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584053", + "name" : "Submit #584053 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on “Theme Editor\" Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in juzaweb CMS up to 3.4.2. It has been classified as critical. Affected is an unknown function of the file /admin-cp/theme/editor/default of the component Theme Editor Page. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5424", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_modify_media_page.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_modify_media_page.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310757", + "name" : "VDB-310757 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310757", + "name" : "VDB-310757 | juzaweb CMS Media Page media access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584052", + "name" : "Submit #584052 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on “Media\" Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in juzaweb CMS up to 3.4.2 and classified as critical. This issue affects some unknown processing of the file /admin-cp/media of the component Media Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20678", + "ASSIGNER" : "security@mediatek.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "name" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20677", + "ASSIGNER" : "security@mediatek.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-476" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "name" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In Bluetooth driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00412256; Issue ID: MSV-3284." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20676", + "ASSIGNER" : "security@mediatek.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-476" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "name" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00412240; Issue ID: MSV-3293." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20675", + "ASSIGNER" : "security@mediatek.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "name" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413201; Issue ID: MSV-3302." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20674", + "ASSIGNER" : "security@mediatek.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "name" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413202; Issue ID: MSV-3303." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20673", + "ASSIGNER" : "security@mediatek.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "name" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413200; Issue ID: MSV-3304." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-20672", + "ASSIGNER" : "security@mediatek.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "name" : "https://corp.mediatek.com/product-security-bulletin/June-2025", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00412257; Issue ID: MSV-3292." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-02T03:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5423", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_modify_general_settings.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_modify_general_settings.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310756", + "name" : "VDB-310756 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310756", + "name" : "VDB-310756 | juzaweb CMS General Setting Page general access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584051", + "name" : "Submit #584051 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on “General Setting\" Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in juzaweb CMS up to 3.4.2 and classified as critical. This vulnerability affects unknown code of the file /admin-cp/setting/system/general of the component General Setting Page. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T02:15Z", + "lastModifiedDate" : "2025-06-02T02:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5422", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_email_logs.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_email_logs.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310755", + "name" : "VDB-310755 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310755", + "name" : "VDB-310755 | juzaweb CMS Email Logs Page email access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584050", + "name" : "Submit #584050 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on “Email Logs\" Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as problematic, was found in juzaweb CMS up to 3.4.2. This affects an unknown part of the file /admin-cp/logs/email of the component Email Logs Page. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-02T01:15Z", + "lastModifiedDate" : "2025-06-02T01:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5421", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_edit_plugins.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_unprivileged_user_access_edit_plugins.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310754", + "name" : "VDB-310754 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310754", + "name" : "VDB-310754 | juzaweb CMS Plugin Editor Page editor access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584049", + "name" : "Submit #584049 | Juzaweb Juzaweb CMS 3.4.2 Broken Access Control on “Plugin” Page", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in juzaweb CMS up to 3.4.2. Affected by this issue is some unknown functionality of the file /admin-cp/plugin/editor of the component Plugin Editor Page. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-02T01:15Z", + "lastModifiedDate" : "2025-06-02T01:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5420", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_avatar_xss.md", + "name" : "https://github.com/Cyber-Wo0dy/report/blob/main/juzawebcms/3.4.2/juzawebcms_avatar_xss.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310753", + "name" : "VDB-310753 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310753", + "name" : "VDB-310753 | juzaweb CMS Profile Page upload cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584048", + "name" : "Submit #584048 | Juzaweb Juzaweb CMS 3.4.2 Cross-Site Scripting", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as problematic was found in juzaweb CMS up to 3.4.2. Affected by this vulnerability is an unknown functionality of the file /admin-cp/file-manager/upload of the component Profile Page. The manipulation of the argument Upload leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 3.5, + "baseSeverity" : "LOW" + }, + "exploitabilityScore" : 2.1, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-02T00:15Z", + "lastModifiedDate" : "2025-06-02T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5412", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad", + "name" : "https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/mistio/mist-ce/releases/tag/v4.7.2", + "name" : "https://github.com/mistio/mist-ce/releases/tag/v4.7.2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Stolichnayer/mist-ce-open-redirect", + "name" : "https://github.com/Stolichnayer/mist-ce-open-redirect", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310752", + "name" : "VDB-310752 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310752", + "name" : "VDB-310752 | Mist Community Edition Authentication Endpoint views.py login cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583534", + "name" : "Submit #583534 | Mist.io Mist Community Edition (CE) 4.7.1 Open Redirect", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as problematic has been found in Mist Community Edition up to 4.7.1. Affected is the function Login of the file src/mist/api/views.py of the component Authentication Endpoint. The manipulation of the argument return_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The name of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 3.5, + "baseSeverity" : "LOW" + }, + "exploitabilityScore" : 2.1, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-02T00:15Z", + "lastModifiedDate" : "2025-06-02T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5411", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad", + "name" : "https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/mistio/mist-ce/releases/tag/v4.7.2", + "name" : "https://github.com/mistio/mist-ce/releases/tag/v4.7.2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Stolichnayer/mist-ce-xss", + "name" : "https://github.com/Stolichnayer/mist-ce-xss", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310751", + "name" : "VDB-310751 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310751", + "name" : "VDB-310751 | Mist Community Edition views.py tag_resources cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583533", + "name" : "Submit #583533 | Mist.io Mist Community Edition (CE) 4.7.1 Cross Site Scripting", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Mist Community Edition up to 4.7.1. It has been rated as problematic. This issue affects the function tag_resources of the file src/mist/api/tag/views.py. The manipulation of the argument tag leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The patch is named db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 3.5, + "baseSeverity" : "LOW" + }, + "exploitabilityScore" : 2.1, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-01T23:15Z", + "lastModifiedDate" : "2025-06-01T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5410", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-352" + }, { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad", + "name" : "https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/mistio/mist-ce/releases/tag/v4.7.2", + "name" : "https://github.com/mistio/mist-ce/releases/tag/v4.7.2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Stolichnayer/mist-ce-csrf", + "name" : "https://github.com/Stolichnayer/mist-ce-csrf", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310750", + "name" : "VDB-310750 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310750", + "name" : "VDB-310750 | Mist Community Edition middleware.py session_start_response cross-site request forgery", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583532", + "name" : "Submit #583532 | Mist.io Mist Community Edition (CE) 4.7.1 Cross-Site Request Forgery", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Mist Community Edition up to 4.7.1. It has been declared as problematic. This vulnerability affects the function session_start_response of the file src/mist/api/auth/middleware.py. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The patch is identified as db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-01T23:15Z", + "lastModifiedDate" : "2025-06-01T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5409", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad", + "name" : "https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/mistio/mist-ce/releases/tag/v4.7.2", + "name" : "https://github.com/mistio/mist-ce/releases/tag/v4.7.2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Stolichnayer/mist-ce-account-takeover", + "name" : "https://github.com/Stolichnayer/mist-ce-account-takeover", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310749", + "name" : "VDB-310749 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310749", + "name" : "VDB-310749 | Mist Community Edition API Token views.py create_token access control", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583531", + "name" : "Submit #583531 | Mist.io Mist Community Edition (CE) 4.7.1 Improper Access Controls", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Mist Community Edition up to 4.7.1. It has been classified as critical. This affects the function create_token of the file src/mist/api/auth/views.py of the component API Token Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The identifier of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-01T22:15Z", + "lastModifiedDate" : "2025-06-01T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5408", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/CH13hh/tmp_store_cc/blob/main/wavlink/1.md", + "name" : "https://github.com/CH13hh/tmp_store_cc/blob/main/wavlink/1.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310748", + "name" : "VDB-310748 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310748", + "name" : "VDB-310748 | WAVLINK WL-WN576K1 HTTP POST Request login.cgi sys_login buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583486", + "name" : "Submit #583486 | WAVLINK WL-WN532A3/WL-WN576K1/QUANTUM D3G/WL-WN530HG3/QUANTUM D2G/WL-WN530G3A <=V1410_240222 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in WAVLINK QUANTUM D2G, QUANTUM D3G, WL-WN530G3A, WL-WN530HG3, WL-WN532A3 and WL-WN576K1 up to V1410_240222 and classified as critical. Affected by this issue is the function sys_login of the file /cgi-bin/login.cgi of the component HTTP POST Request Handler. The manipulation of the argument login_page leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-06-01T22:15Z", + "lastModifiedDate" : "2025-06-01T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5407", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20Stored%20XSS%20in%20User%20Registration%20via%20fullname%20Parameter%20Leading%20to%20Admin%20Account%20Takeover.md", + "name" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20Stored%20XSS%20in%20User%20Registration%20via%20fullname%20Parameter%20Leading%20to%20Admin%20Account%20Takeover.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310747", + "name" : "VDB-310747 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310747", + "name" : "VDB-310747 | chaitak-gorai Blogbook register_script.php cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583432", + "name" : "Submit #583432 | chaitak-gorai blogbook latest version as of 2025/05/23 Cross Site Scripting", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register_script.php. The manipulation of the argument fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 2.4, + "baseSeverity" : "LOW" + }, + "exploitabilityScore" : 0.9, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-01T21:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5406", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-434" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20posts.php%20add_post%20post_image%20Parameter%20Unrestricted%20Upload.md", + "name" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20posts.php%20add_post%20post_image%20Parameter%20Unrestricted%20Upload.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310746", + "name" : "VDB-310746 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310746", + "name" : "VDB-310746 | chaitak-gorai Blogbook posts.php unrestricted upload", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583427", + "name" : "Submit #583427 | chaitak-gorai blogbook latest version as of 2025/05/23 Unrestricted Upload", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. Affected is an unknown function of the file /admin/posts.php?source=add_post. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-01T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5405", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20post.php%20Stored%20Cross-Site%20Scripting%20(XSS)%20in%20Comment%20Functionality%20Leading%20to%20Admin%20and%20User%20Account%20Takeover.md", + "name" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20post.php%20Stored%20Cross-Site%20Scripting%20(XSS)%20in%20Comment%20Functionality%20Leading%20to%20Admin%20and%20User%20Account%20Takeover.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310745", + "name" : "VDB-310745 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310745", + "name" : "VDB-310745 | chaitak-gorai Blogbook post.php cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582925", + "name" : "Submit #582925 | chaitak-gorai blogbook latest version as of 2025/05/22 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as problematic, has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This issue affects some unknown processing of the file /post.php. The manipulation of the argument comment_author/comment_email/comment_content leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 3.5, + "baseSeverity" : "LOW" + }, + "exploitabilityScore" : 2.1, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-01T18:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5404", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-404" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20search.php%20search%20Parameter%20SQL%20Injection.md", + "name" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20search.php%20search%20Parameter%20SQL%20Injection.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310744", + "name" : "VDB-310744 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310744", + "name" : "VDB-310744 | chaitak-gorai Blogbook GET Parameter search.php denial of service", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582915", + "name" : "Submit #582915 | chaitak-gorai blogbook latest version as of 2025/05/22 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as problematic was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This vulnerability affects unknown code of the file /search.php of the component GET Parameter Handler. The manipulation of the argument Search leads to denial of service. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector" : "ADJACENT_NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "LOW", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-06-01T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5403", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20posts.php%20delete_post%20delete%20Parameter%20SQL%20Injection.md", + "name" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20posts.php%20delete_post%20delete%20Parameter%20SQL%20Injection.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310743", + "name" : "VDB-310743 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310743", + "name" : "VDB-310743 | chaitak-gorai Blogbook GET Parameter view_all_posts.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582910", + "name" : "Submit #582910 | chaitak-gorai blogbook latest version as of 2025/05/22 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. This affects an unknown part of the file /admin/view_all_posts.php of the component GET Parameter Handler. The manipulation of the argument post_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-01T16:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5402", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20posts.php%20edit_post%20p_id%20Parameter%20SQL%20Injection.md", + "name" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20posts.php%20edit_post%20p_id%20Parameter%20SQL%20Injection.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310742", + "name" : "VDB-310742 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310742", + "name" : "VDB-310742 | chaitak-gorai Blogbook GET Parameter edit_post.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582904", + "name" : "Submit #582904 | chaitak-gorai blogbook latest version as of 2025/05/22 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/includes/edit_post.php of the component GET Parameter Handler. The manipulation of the argument edit_post_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-01T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40908", + "ASSIGNER" : "cve-request@security.metacpan.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ingydotnet/yaml-libyaml-pm/issues/120", + "name" : "https://github.com/ingydotnet/yaml-libyaml-pm/issues/120", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/ingydotnet/yaml-libyaml-pm/pull/121", + "name" : "https://github.com/ingydotnet/yaml-libyaml-pm/pull/121", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/ingydotnet/yaml-libyaml-pm/pull/122", + "name" : "https://github.com/ingydotnet/yaml-libyaml-pm/pull/122", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-06-01T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5401", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20post.php%20p_id%20Parameter%20SQL%20Injection.md", + "name" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20post.php%20p_id%20Parameter%20SQL%20Injection.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310741", + "name" : "VDB-310741 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310741", + "name" : "VDB-310741 | chaitak-gorai Blogbook GET Parameter post.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582874", + "name" : "Submit #582874 | chaitak-gorai blogbook latest version as of 2025/05/22 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /post.php of the component GET Parameter Handler. The manipulation of the argument p_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-01T13:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-33005", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-613" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7235182", + "name" : "https://www.ibm.com/support/pages/node/7235182", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Planning Analytics Local 2.0 and 2.1 does not invalidate session after a logout which could allow an authenticated user to impersonate another user on the system." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-01T12:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-33004", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7235182", + "name" : "https://www.ibm.com/support/pages/node/7235182", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Planning Analytics Local 2.0 and 2.1 could allow a privileged user to delete files from directories due to improper pathname restriction." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 6.5, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.2, + "impactScore" : 5.2 + } + }, + "publishedDate" : "2025-06-01T12:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2896", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7235182", + "name" : "https://www.ibm.com/support/pages/node/7235182", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "REQUIRED", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.8, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.7, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-06-01T12:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-25044", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7235182", + "name" : "https://www.ibm.com/support/pages/node/7235182", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 5.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.3, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-06-01T12:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1499", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-312" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7233154", + "name" : "https://www.ibm.com/support/pages/node/7233154", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM InfoSphere Information Server 11.7 stores credential information for database authentication in a cleartext parameter file that could be viewed by an authenticated user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 6.5, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-06-01T12:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5400", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20user.php%20u_id%20Parameter%20SQL%20Injection.md", + "name" : "https://github.com/rllvusgnzm98/Report/blob/main/blogbook/BlogBook%20user.php%20u_id%20Parameter%20SQL%20Injection.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310740", + "name" : "VDB-310740 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310740", + "name" : "VDB-310740 | chaitak-gorai Blogbook GET Parameter user.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582865", + "name" : "Submit #582865 | chaitak-gorai blogbook latest version as of 2025/05/22 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in chaitak-gorai Blogbook up to 92f5cf90f8a7e6566b576fe0952e14e1c6736513. It has been classified as critical. Affected is an unknown function of the file /user.php of the component GET Parameter Handler. The manipulation of the argument u_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-06-01T09:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5390", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310683", + "name" : "VDB-310683 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310683", + "name" : "VDB-310683 | JeeWMS File filedeal.do filedeal access control", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in JeeWMS up to 20250504. This affects the function filedeal of the file /systemController/filedeal.do of the component File Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-31T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5389", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310682", + "name" : "VDB-310682 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310682", + "name" : "VDB-310682 | JeeWMS File generateController.do dogenerateOne2Many access control", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in JeeWMS up to 20250504. Affected by this issue is the function dogenerateOne2Many of the file /generateController.do?dogenerateOne2Many of the component File Handler. The manipulation leads to improper access controls. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-31T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5388", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310681", + "name" : "VDB-310681 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310681", + "name" : "VDB-310681 | JeeWMS generateController.do dogenerate sql injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in JeeWMS up to 20250504. Affected by this vulnerability is the function dogenerate of the file /generateController.do?dogenerate. The manipulation leads to sql injection. The attack can be launched remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-31T18:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5387", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-266" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310680", + "name" : "VDB-310680 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310680", + "name" : "VDB-310680 | JeeWMS File generateController.do dogenerate access control", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in JeeWMS up to 20250504. Affected is the function dogenerate of the file /generateController.do?dogenerate of the component File Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-31T18:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5386", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310679", + "name" : "VDB-310679 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310679", + "name" : "VDB-310679 | JeeWMS cgformTransController.do transEditor sql injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in JeeWMS up to 20250504. It has been rated as critical. This issue affects the function transEditor of the file /cgformTransController.do?transEditor. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-31T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5385", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310678", + "name" : "VDB-310678 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310678", + "name" : "VDB-310678 | JeeWMS cgformTemplateController.do doAdd path traversal", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in JeeWMS up to 20250504. It has been declared as critical. This vulnerability affects the function doAdd of the file /cgformTemplateController.do?doAdd. The manipulation leads to path traversal. The attack can be initiated remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-31T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5384", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310677", + "name" : "VDB-310677 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310677", + "name" : "VDB-310677 | JeeWMS cgAutoListController.do CgAutoListController sql injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in JeeWMS up to 20250504. It has been classified as critical. This affects the function CgAutoListController of the file /cgAutoListController.do?datagrid. The manipulation leads to sql injection. It is possible to initiate the attack remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-31T16:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5383", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/wanglongcn/yifang/issues/IC41YQ", + "name" : "https://gitee.com/wanglongcn/yifang/issues/IC41YQ", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gitee.com/wanglongcn/yifang/issues/IC41YQ", + "name" : "https://gitee.com/wanglongcn/yifang/issues/IC41YQ", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310676", + "name" : "VDB-310676 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310676", + "name" : "VDB-310676 | Yifang CMS Article Management Module cross site scripting", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Yifang CMS up to 2.0.2 and classified as problematic. Affected by this issue is some unknown functionality of the component Article Management Module. The manipulation of the argument Default Value leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T15:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5381", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/wanglongcn/yifang/issues/IC0RCX", + "name" : "https://gitee.com/wanglongcn/yifang/issues/IC0RCX", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gitee.com/wanglongcn/yifang/issues/IC0RCX", + "name" : "https://gitee.com/wanglongcn/yifang/issues/IC0RCX", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310674", + "name" : "VDB-310674 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310674", + "name" : "VDB-310674 | Yifang CMS Admin Panel downloadFile path traversal", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as problematic, was found in Yifang CMS up to 2.0.2. Affected is the function downloadFile of the file /api/File/downloadFile of the component Admin Panel. The manipulation of the argument File leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T15:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5380", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitee.com/ashinigit/XueShengZhuSu/issues/IC9VZD", + "name" : "https://gitee.com/ashinigit/XueShengZhuSu/issues/IC9VZD", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gitee.com/ashinigit/XueShengZhuSu/issues/IC9VZD", + "name" : "https://gitee.com/ashinigit/XueShengZhuSu/issues/IC9VZD", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310673", + "name" : "VDB-310673 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310673", + "name" : "VDB-310673 | ashinigit ???? XueShengZhuSu ???????? Image File Upload upload path traversal", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583119", + "name" : "Submit #583119 | XueShengZhuSu 1 Insecure access control", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in ashinigit ???? XueShengZhuSu ???????? up to 4d3f0ada0e71482c1e51fd5f5615e5a3d8bcbfbb. This issue affects some unknown processing of the file /upload/ of the component Image File Upload. The manipulation of the argument File leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5379", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-798" + }, { + "lang" : "en", + "value" : "CWE-259" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310672", + "name" : "VDB-310672 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310672", + "name" : "VDB-310672 | NuCom NC-WR744G Console Application hard-coded credentials", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582868", + "name" : "Submit #582868 | NuCom NC-WR744G 8.5.5 (Build:20200530.307-TEMP) Cleartext Storage of Sensitive Information", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in NuCom NC-WR744G 8.5.5 Build 20200530.307. This vulnerability affects unknown code of the component Console Application. The manipulation of the argument CMCCAdmin/useradmin/CUAdmin leads to hard-coded credentials. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-31T14:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5378", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310671", + "name" : "VDB-310671 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310671", + "name" : "VDB-310671 | Astun Technology iShare Maps mycouncil2.aspx cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582841", + "name" : "Submit #582841 | Astun Technology iShare Maps 5.4.0 Cross Site Scripting", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as problematic has been found in Astun Technology iShare Maps 5.4.0. This affects an unknown part of the file mycouncil2.aspx. The manipulation of the argument atTxtStreet leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-31T13:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5377", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310670", + "name" : "VDB-310670 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310670", + "name" : "VDB-310670 | Astun Technology iShare Maps historic1.asp cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582835", + "name" : "Submit #582835 | Astun Technology iShare Maps 5.4.0 Cross Site Scripting", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Astun Technology iShare Maps 5.4.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file historic1.asp. The manipulation of the argument Zoom leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-31T13:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5376", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/shanranne/myCVE/issues/5", + "name" : "https://github.com/shanranne/myCVE/issues/5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/shanranne/myCVE/issues/5", + "name" : "https://github.com/shanranne/myCVE/issues/5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310669", + "name" : "VDB-310669 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310669", + "name" : "VDB-310669 | SourceCodester Health Center Patient Record Management System patient.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.587405", + "name" : "Submit #587405 | sourcecodester Health Center Patient Record Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sourcecodester.com/", + "name" : "https://www.sourcecodester.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in SourceCodester Health Center Patient Record Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /patient.php. The manipulation of the argument itr_no leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T12:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4857", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/newsletters-lite/trunk/wp-mailinglist.php#L1584", + "name" : "https://plugins.trac.wordpress.org/browser/newsletters-lite/trunk/wp-mailinglist.php#L1584", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3303758/", + "name" : "https://plugins.trac.wordpress.org/changeset/3303758/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/33c0838a-5f86-4368-8bf9-da0582acbabf?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/33c0838a-5f86-4368-8bf9-da0582acbabf?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Newsletters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.9.9.9 via the 'file' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.2, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.2, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-31T12:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4691", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-639" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/easync-booking/tags/1.3.17/easync.php#L4859", + "name" : "https://plugins.trac.wordpress.org/browser/easync-booking/tags/1.3.17/easync.php#L4859", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3243634/", + "name" : "https://plugins.trac.wordpress.org/changeset/3243634/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3293607/", + "name" : "https://plugins.trac.wordpress.org/changeset/3293607/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3300408/", + "name" : "https://plugins.trac.wordpress.org/changeset/3300408/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c9953b3-dd09-4c80-be11-4daf3bbac720?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c9953b3-dd09-4c80-be11-4daf3bbac720?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Free Booking Plugin for Hotels, Restaurants and Car Rentals – eaSYNC Booking plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.21 via the 'view_request_details' due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view the details of any booking request. The vulnerability was partially patched in versions 1.3.18 and 1.3.21." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-31T12:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5375", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/f1rstb100d/myCVE/issues/29", + "name" : "https://github.com/f1rstb100d/myCVE/issues/29", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/f1rstb100d/myCVE/issues/29", + "name" : "https://github.com/f1rstb100d/myCVE/issues/29", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310668", + "name" : "VDB-310668 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310668", + "name" : "VDB-310668 | PHPGurukul HPGurukul Online Birth Certificate System registered-users.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.587394", + "name" : "Submit #587394 | PHPGurukul Online Birth Certificate System 2.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul HPGurukul Online Birth Certificate System 2.0. It has been classified as critical. Affected is an unknown function of the file /admin/registered-users.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T11:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5374", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/f1rstb100d/myCVE/issues/28", + "name" : "https://github.com/f1rstb100d/myCVE/issues/28", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/f1rstb100d/myCVE/issues/28", + "name" : "https://github.com/f1rstb100d/myCVE/issues/28", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310667", + "name" : "VDB-310667 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310667", + "name" : "VDB-310667 | PHPGurukul Online Birth Certificate System all-applications.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.587393", + "name" : "Submit #587393 | PHPGurukul Online Birth Certificate System 2.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul Online Birth Certificate System 2.0 and classified as critical. This issue affects some unknown processing of the file /admin/all-applications.php. The manipulation of the argument del leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T10:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5373", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/f1rstb100d/myCVE/issues/27", + "name" : "https://github.com/f1rstb100d/myCVE/issues/27", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/f1rstb100d/myCVE/issues/27", + "name" : "https://github.com/f1rstb100d/myCVE/issues/27", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310666", + "name" : "VDB-310666 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310666", + "name" : "VDB-310666 | PHPGurukul Online Birth Certificate System users-applications.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.587392", + "name" : "Submit #587392 | PHPGurukul Online Birth Certificate System 2.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in PHPGurukul Online Birth Certificate System 2.0 and classified as critical. This vulnerability affects unknown code of the file /admin/users-applications.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T09:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5371", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/shanranne/myCVE/issues/4", + "name" : "https://github.com/shanranne/myCVE/issues/4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/shanranne/myCVE/issues/4", + "name" : "https://github.com/shanranne/myCVE/issues/4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310664", + "name" : "VDB-310664 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310664", + "name" : "VDB-310664 | SourceCodester Health Center Patient Record Management System admin.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.587382", + "name" : "Submit #587382 | sourcecodester Health Center Patient Record Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sourcecodester.com/", + "name" : "https://www.sourcecodester.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in SourceCodester Health Center Patient Record Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/admin.php. The manipulation of the argument Username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T08:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5290", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L230", + "name" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L230", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L288", + "name" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L288", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L72", + "name" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/assets/scripts/borderless-elementor.min.js#L72", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/circular-progress-bar.php#L433", + "name" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/circular-progress-bar.php#L433", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/progress-bar.php#L417", + "name" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/progress-bar.php#L417", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/semi-circular-progress-bar.php#L410", + "name" : "https://plugins.trac.wordpress.org/browser/borderless/trunk/modules/elementor/widgets/semi-circular-progress-bar.php#L410", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3302155/", + "name" : "https://plugins.trac.wordpress.org/changeset/3302155/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4492aede-b68d-46b8-955f-81ebdc875921?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4492aede-b68d-46b8-955f-81ebdc875921?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Borderless – Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title’ parameter in all versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-31T08:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3813", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1021/classes/modules/forms/wpr-submissions-cpt.php?rev=3301438", + "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1021/classes/modules/forms/wpr-submissions-cpt.php?rev=3301438", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/classes/modules/forms/wpr-submissions-cpt.php#L24", + "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/classes/modules/forms/wpr-submissions-cpt.php#L24", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/classes/modules/forms/wpr-submissions-cpt.php#L75", + "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/classes/modules/forms/wpr-submissions-cpt.php#L75", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b957eb0d-882d-4646-ad84-9c64f957be14?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b957eb0d-882d-4646-ad84-9c64f957be14?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_elementor_data’ parameter in all versions up to, and including, 1.7.1020 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-31T08:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5292", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/changeset/3302152/", + "name" : "https://plugins.trac.wordpress.org/changeset/3302152/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8dfdd8-820c-4066-8014-2cb5b9f935a4?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8dfdd8-820c-4066-8014-2cb5b9f935a4?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Element Pack Addons for Elementor – Best Elementor addons with Ready Templates, Blocks, Widgets and WooCommerce Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'marker_content’ parameter in all versions up to, and including, 5.11.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-31T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5285", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/product-subtitle-for-woocommerce/tags/1.3.9/includes/plugins/class-pswc-guternburg-block.php#L82", + "name" : "https://plugins.trac.wordpress.org/browser/product-subtitle-for-woocommerce/tags/1.3.9/includes/plugins/class-pswc-guternburg-block.php#L82", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/product-subtitle-for-woocommerce/#developers", + "name" : "https://wordpress.org/plugins/product-subtitle-for-woocommerce/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b276b1f7-e618-491f-beb4-675228632fa0?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b276b1f7-e618-491f-beb4-675228632fa0?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Product Subtitle for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘htmlTag’ parameter in all versions up to, and including, 1.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-31T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4672", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-285" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/offsprout-page-builder/tags/2.15.2/api/class-offsprout-api-extensions.php#L5", + "name" : "https://plugins.trac.wordpress.org/browser/offsprout-page-builder/tags/2.15.2/api/class-offsprout-api-extensions.php#L5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/offsprout-page-builder/tags/2.15.2/api/class-offsprout-api-extensions.php#L514", + "name" : "https://plugins.trac.wordpress.org/browser/offsprout-page-builder/tags/2.15.2/api/class-offsprout-api-extensions.php#L514", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/offsprout-page-builder/#developers", + "name" : "https://wordpress.org/plugins/offsprout-page-builder/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9269d18d-8d83-43ff-b777-ba8f58321e9e?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9269d18d-8d83-43ff-b777-ba8f58321e9e?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Offsprout Page Builder plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization placed on the permission_callback() function in versions 2.2.1 to 2.15.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to read, create, update or delete any user meta, including flipping their own wp_capabilities to administrator and fully escalate their privileges." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-31T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4631", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-285" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/profitori/tags/2.1.1.3/profitori.php#L2675", + "name" : "https://plugins.trac.wordpress.org/browser/profitori/tags/2.1.1.3/profitori.php#L2675", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/profitori/tags/2.1.1.3/profitori.php#L2679", + "name" : "https://plugins.trac.wordpress.org/browser/profitori/tags/2.1.1.3/profitori.php#L2679", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/profitori/tags/2.1.1.3/profitori.php#L2698", + "name" : "https://plugins.trac.wordpress.org/browser/profitori/tags/2.1.1.3/profitori.php#L2698", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/profitori/tags/2.1.1.3/profitori.php#L3673", + "name" : "https://plugins.trac.wordpress.org/browser/profitori/tags/2.1.1.3/profitori.php#L3673", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/profitori/#developers", + "name" : "https://wordpress.org/plugins/profitori/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c764811f-e9dc-4c3d-b696-5792e70ff0b6?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c764811f-e9dc-4c3d-b696-5792e70ff0b6?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Profitori plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the stocktend_object endpoint in versions 2.0.6.0 to 2.1.1.3. This makes it possible to trigger the save_object_as_user() function for objects whose '_datatype' is set to 'users',. This allows unauthenticated attackers to write arbitrary strings straight into the user’s wp_capabilities meta field, potentially elevating the privileges of an existing user account or a newly created one to that of an administrator." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-31T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4607", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-330" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/psw-login-and-registration/trunk/public/class-prositegeneralfeatures-public.php#L323", + "name" : "https://plugins.trac.wordpress.org/browser/psw-login-and-registration/trunk/public/class-prositegeneralfeatures-public.php#L323", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/psw-login-and-registration/trunk/public/class-prositegeneralfeatures-public.php#L493", + "name" : "https://plugins.trac.wordpress.org/browser/psw-login-and-registration/trunk/public/class-prositegeneralfeatures-public.php#L493", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/psw-login-and-registration/trunk/public/class-prositegeneralfeatures-public.php#L731", + "name" : "https://plugins.trac.wordpress.org/browser/psw-login-and-registration/trunk/public/class-prositegeneralfeatures-public.php#L731", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/psw-login-and-registration/#developers", + "name" : "https://wordpress.org/plugins/psw-login-and-registration/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2d6e595-0682-4a41-a432-afbcb50144e8?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2d6e595-0682-4a41-a432-afbcb50144e8?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The PSW Front-end Login & Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.12 via the customer_registration() function. This is due to the use of a weak, low-entropy OTP mechanism in the forget() function. This makes it possible for unauthenticated attackers to initiate a password reset for any user, including administrators, and elevate their privileges for full site takeover." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-31T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4595", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://wordpress.org/plugins/fastspring/", + "name" : "https://wordpress.org/plugins/fastspring/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e96d118a-e38c-4043-9550-5f5ab0d83dc7?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e96d118a-e38c-4043-9550-5f5ab0d83dc7?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The FastSpring plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fastspring/block-fastspringblocks-complete-product-catalog' block in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping on the 'color' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-31T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4590", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://wordpress.org/plugins/daisycon/", + "name" : "https://wordpress.org/plugins/daisycon/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/74551e01-063c-4493-8472-9c0903ac17c5?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/74551e01-063c-4493-8472-9c0903ac17c5?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Daisycon prijsvergelijkers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'daisycon_uitvaart' shortcode in all versions up to, and including, 4.8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-31T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4103", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-285" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/wp-geometa/tags/0.3.4/lib/wp-geometa-dash.php#L896", + "name" : "https://plugins.trac.wordpress.org/browser/wp-geometa/tags/0.3.4/lib/wp-geometa-dash.php#L896", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/wp-geometa/#developers", + "name" : "https://wordpress.org/plugins/wp-geometa/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/43039f2a-b3f9-4836-8b55-e8a091b1a102?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/43039f2a-b3f9-4836-8b55-e8a091b1a102?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The WP-GeoMeta plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the wp_ajax_wpgm_start_geojson_import() function in versions 0.3.4 to 0.3.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-31T07:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5370", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/GarminYoung/myCVE/issues/5", + "name" : "https://github.com/GarminYoung/myCVE/issues/5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/GarminYoung/myCVE/issues/5", + "name" : "https://github.com/GarminYoung/myCVE/issues/5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310663", + "name" : "VDB-310663 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310663", + "name" : "VDB-310663 | PHPGurukul News Portal forgot-password.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.587365", + "name" : "Submit #587365 | PHPGurukul News Portal Project 4.1 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in PHPGurukul News Portal 4.1. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T06:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5369", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/shanranne/myCVE/issues/2", + "name" : "https://github.com/shanranne/myCVE/issues/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/shanranne/myCVE/issues/2", + "name" : "https://github.com/shanranne/myCVE/issues/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310662", + "name" : "VDB-310662 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310662", + "name" : "VDB-310662 | SourceCodester PHP Display Username After Login login.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.587234", + "name" : "Submit #587234 | sourcecodester PHP - Display Username After Login V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sourcecodester.com/", + "name" : "https://www.sourcecodester.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in SourceCodester PHP Display Username After Login 1.0. Affected is an unknown function of the file /login.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T05:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5368", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/f1rstb100d/myCVE/issues/25", + "name" : "https://github.com/f1rstb100d/myCVE/issues/25", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/f1rstb100d/myCVE/issues/25", + "name" : "https://github.com/f1rstb100d/myCVE/issues/25", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310661", + "name" : "VDB-310661 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310661", + "name" : "VDB-310661 | PHPGurukul Daily Expense Tracker System expense-yearwise-reports-detailed.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586911", + "name" : "Submit #586911 | PHPGurukul Daily Expense Tracker System 1.1 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul Daily Expense Tracker System 1.1. It has been rated as critical. This issue affects some unknown processing of the file /expense-yearwise-reports-detailed.php. The manipulation of the argument todate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T04:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5016", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/relevanssi/tags/4.24.5/lib/excerpts-highlights.php#L418", + "name" : "https://plugins.trac.wordpress.org/browser/relevanssi/tags/4.24.5/lib/excerpts-highlights.php#L418", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ffb2ade3-d5ce-4459-ab83-e28cd4c84922?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ffb2ade3-d5ce-4459-ab83-e28cd4c84922?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Relevanssi – A Better Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Excerpt Highlights in all versions up to, and including, 4.24.5 (Free) and 2.27.6 (Premium) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "HIGH", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.7, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.6, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-31T04:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5367", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/shanranne/myCVE/issues/1", + "name" : "https://github.com/shanranne/myCVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/shanranne/myCVE/issues/1", + "name" : "https://github.com/shanranne/myCVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310660", + "name" : "VDB-310660 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310660", + "name" : "VDB-310660 | PHPGurukul Online Shopping Portal Project category.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586814", + "name" : "Submit #586814 | PHPGurukul Online Shopping Portal Project V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul Online Shopping Portal Project 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /category.php. The manipulation of the argument Product leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T02:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5365", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/yuanchaoxxxxx/CVE/issues/1", + "name" : "https://github.com/yuanchaoxxxxx/CVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/yuanchaoxxxxx/CVE/issues/1", + "name" : "https://github.com/yuanchaoxxxxx/CVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310659", + "name" : "VDB-310659 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310659", + "name" : "VDB-310659 | Campcodes Online Hospital Management System patient-search.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586700", + "name" : "Submit #586700 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Campcodes Online Hospital Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/patient-search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T01:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2018-25111", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/django-helpdesk/django-helpdesk/issues/591", + "name" : "https://github.com/django-helpdesk/django-helpdesk/issues/591", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/django-helpdesk/django-helpdesk/pull/1120", + "name" : "https://github.com/django-helpdesk/django-helpdesk/pull/1120", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/django-helpdesk/django-helpdesk/pull/1120", + "name" : "https://github.com/django-helpdesk/django-helpdesk/pull/1120", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/django-helpdesk/django-helpdesk/releases/tag/v1.0.0", + "name" : "https://github.com/django-helpdesk/django-helpdesk/releases/tag/v1.0.0", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in models.py." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-31T01:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5364", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/yuanchaoxxxxx/CVE/issues/2", + "name" : "https://github.com/yuanchaoxxxxx/CVE/issues/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/yuanchaoxxxxx/CVE/issues/2", + "name" : "https://github.com/yuanchaoxxxxx/CVE/issues/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310658", + "name" : "VDB-310658 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310658", + "name" : "VDB-310658 | Campcodes Online Hospital Management System add-patient.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586699", + "name" : "Submit #586699 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Campcodes Online Hospital Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /doctor/add-patient.php. The manipulation of the argument patname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T22:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5363", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/yuanchaoxxxxx/CVE/issues/3", + "name" : "https://github.com/yuanchaoxxxxx/CVE/issues/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/yuanchaoxxxxx/CVE/issues/3", + "name" : "https://github.com/yuanchaoxxxxx/CVE/issues/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310657", + "name" : "VDB-310657 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310657", + "name" : "VDB-310657 | Campcodes Online Hospital Management System index.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586698", + "name" : "Submit #586698 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in Campcodes Online Hospital Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /doctor/index.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T21:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5362", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ASantsSec/CVE/issues/10", + "name" : "https://github.com/ASantsSec/CVE/issues/10", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310656", + "name" : "VDB-310656 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310656", + "name" : "VDB-310656 | Campcodes Online Hospital Management System doctor-specilization.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586596", + "name" : "Submit #586596 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in Campcodes Online Hospital Management System 1.0. Affected is an unknown function of the file /admin/doctor-specilization.php. The manipulation of the argument doctorspecilization leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-30T21:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5361", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ASantsSec/CVE/issues/9", + "name" : "https://github.com/ASantsSec/CVE/issues/9", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310655", + "name" : "VDB-310655 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310655", + "name" : "VDB-310655 | Campcodes Online Hospital Management System contact.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586592", + "name" : "Submit #586592 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in Campcodes Online Hospital Management System 1.0. This issue affects some unknown processing of the file /contact.php. The manipulation of the argument fullname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5360", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ASantsSec/CVE/issues/8", + "name" : "https://github.com/ASantsSec/CVE/issues/8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310654", + "name" : "VDB-310654 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310654", + "name" : "VDB-310654 | Campcodes Online Hospital Management System book-appointment.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586591", + "name" : "Submit #586591 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in Campcodes Online Hospital Management System 1.0. This vulnerability affects unknown code of the file /book-appointment.php. The manipulation of the argument doctor leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48949", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/navidrome/navidrome/commit/b19d5f0d3e079639904cac95735228f445c798b6", + "name" : "https://github.com/navidrome/navidrome/commit/b19d5f0d3e079639904cac95735228f445c798b6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/navidrome/navidrome/security/advisories/GHSA-5wgp-vjxm-3x2r", + "name" : "https://github.com/navidrome/navidrome/security/advisories/GHSA-5wgp-vjxm-3x2r", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Navidrome is an open source web-based music collection server and streamer. Versions 0.55.0 through 0.55.2 have a vulnerability due to improper input validation on the `role` parameter within the API endpoint `/api/artist`. Attackers can exploit this flaw to inject arbitrary SQL queries, potentially gaining unauthorized access to the backend database and compromising sensitive user information. Version 0.56.0 contains a patch for the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48948", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/navidrome/navidrome/commit/e5438552c63fecb6284e1b179dddae91ede869c8", + "name" : "https://github.com/navidrome/navidrome/commit/e5438552c63fecb6284e1b179dddae91ede869c8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/navidrome/navidrome/pull/4096", + "name" : "https://github.com/navidrome/navidrome/pull/4096", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/navidrome/navidrome/security/advisories/GHSA-f238-rggp-82m3", + "name" : "https://github.com/navidrome/navidrome/security/advisories/GHSA-f238-rggp-82m3", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Navidrome is an open source web-based music collection server and streamer. A permission verification flaw in versions prior to 0.56.0 allows any authenticated regular user to bypass authorization checks and perform administrator-only transcoding configuration operations, including creating, modifying, and deleting transcoding settings. In the threat model where administrators are trusted but regular users are not, this vulnerability represents a significant security risk when transcoding is enabled. Version 0.56.0 patches the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48946", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-327" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://durumcrustulum.com/2024/02/24/how-to-hold-kems/#hqc", + "name" : "https://durumcrustulum.com/2024/02/24/how-to-hold-kems/#hqc", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/open-quantum-safe/liboqs/commit/a7d698ca9c9d98990647459253183cbe29c550af", + "name" : "https://github.com/open-quantum-safe/liboqs/commit/a7d698ca9c9d98990647459253183cbe29c550af", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/open-quantum-safe/liboqs/security/advisories/GHSA-3rxw-4v8q-9gq5", + "name" : "https://github.com/open-quantum-safe/liboqs/security/advisories/GHSA-3rxw-4v8q-9gq5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Wiu4ZQo3fP80", + "name" : "https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Wiu4ZQo3fP80", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. liboqs prior to version 0.13.0 supports the HQC algorithm, an algorithm with a theoretical design flaw which leads to large numbers of malformed ciphertexts sharing the same implicit rejection value. Currently, no concrete attack on the algorithm is known. However, prospective users of HQC must take extra care when using the algorithm in protocols involving key derivation. In particular, HQC does not provide the same security guarantees as Kyber or ML-KEM. There is currently no patch for the HQC flaw available in liboqs, so HQC is disabled by default in liboqs starting from version 0.13.0. OQS will update its implementation after the HQC team releases an updated algorithm specification." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48882", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-611" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/PHPOffice/Math/commit/fc31c8f57a7a81f962cbf389fd89f4d9d06fc99a", + "name" : "https://github.com/PHPOffice/Math/commit/fc31c8f57a7a81f962cbf389fd89f4d9d06fc99a", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/PHPOffice/Math/security/advisories/GHSA-42hm-pq2f-3r7m", + "name" : "https://github.com/PHPOffice/Math/security/advisories/GHSA-42hm-pq2f-3r7m", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "PHPOffice Math is a library that provides a set of classes to manipulate different formula file formats. Prior to version 0.3.0, loading XML data using the standard `libxml` extension and the `LIBXML_DTDLOAD` flag without additional filtration, leads to XXE. Version 0.3.0 fixes the vulnerability." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48874", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-5257. Reason: This candidate is a duplicate of CVE-2025-5257. Notes: All CVE users should reference CVE-2025-5257 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-05-30T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48873", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-5256. Reason: This candidate is a duplicate of CVE-2025-5256. Notes: All CVE users should reference CVE-2025-5256 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-05-30T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48872", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47055. Reason: This candidate is a duplicate of CVE-2024-47055. Notes: All CVE users should reference CVE-2024-47055 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-05-30T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48871", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47056. Reason: This candidate is a duplicate of CVE-2024-47056. Notes: All CVE users should reference CVE-2024-47056 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-05-30T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48870", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47057. Reason: This candidate is a duplicate of CVE-2024-47057. Notes: All CVE users should reference CVE-2024-47057 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-05-30T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2503", + "ASSIGNER" : "psirt@lenovo.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://iknow.lenovo.com.cn/detail/428586", + "name" : "https://iknow.lenovo.com.cn/detail/428586", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An improper permission handling vulnerability was reported in Lenovo PC Manager that could allow a local attacker to perform arbitrary file deletions as an elevated user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.1, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.2 + } + }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2502", + "ASSIGNER" : "psirt@lenovo.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://iknow.lenovo.com.cn/detail/428586", + "name" : "https://iknow.lenovo.com.cn/detail/428586", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An improper default permissions vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2501", + "ASSIGNER" : "psirt@lenovo.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://iknow.lenovo.com.cn/detail/428586", + "name" : "https://iknow.lenovo.com.cn/detail/428586", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An untrusted search path vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1479", + "ASSIGNER" : "psirt@lenovo.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-186929", + "name" : "https://support.lenovo.com/us/en/product_security/LEN-186929", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An open debug interface was reported in the Legion Space software included on certain Legion devices that could allow a local attacker to execute arbitrary code." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-30T20:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5359", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ASantsSec/CVE/issues/7", + "name" : "https://github.com/ASantsSec/CVE/issues/7", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310653", + "name" : "VDB-310653 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310653", + "name" : "VDB-310653 | Campcodes Online Hospital Management System appointment-history.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586590", + "name" : "Submit #586590 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in Campcodes Online Hospital Management System 1.0. This affects an unknown part of the file /appointment-history.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-30T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48944", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-20" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/vllm-project/vllm/pull/17623", + "name" : "https://github.com/vllm-project/vllm/pull/17623", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-vrq3-r879-7m65", + "name" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-vrq3-r879-7m65", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "vLLM is an inference and serving engine for large language models (LLMs). In version 0.8.0 up to but excluding 0.9.0, the vLLM backend used with the /v1/chat/completions OpenAPI endpoint fails to validate unexpected or malformed input in the \"pattern\" and \"type\" fields when the tools functionality is invoked. These inputs are not validated before being compiled or parsed, causing a crash of the inference worker with a single request. The worker will remain down until it is restarted. Version 0.9.0 fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48943", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-248" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/vllm-project/vllm/commit/08bf7840780980c7568c573c70a6a8db94fd45ff", + "name" : "https://github.com/vllm-project/vllm/commit/08bf7840780980c7568c573c70a6a8db94fd45ff", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/issues/17313", + "name" : "https://github.com/vllm-project/vllm/issues/17313", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/pull/17623", + "name" : "https://github.com/vllm-project/vllm/pull/17623", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-9hcf-v7m4-6m2j", + "name" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-9hcf-v7m4-6m2j", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 up to but excluding 0.9.0 have a Denial of Service (ReDoS) that causes the vLLM server to crash if an invalid regex was provided while using structured output. This vulnerability is similar to GHSA-6qc9-v4r8-22xg/CVE-2025-48942, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48942", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-248" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/vllm-project/vllm/commit/08bf7840780980c7568c573c70a6a8db94fd45ff", + "name" : "https://github.com/vllm-project/vllm/commit/08bf7840780980c7568c573c70a6a8db94fd45ff", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/issues/17248", + "name" : "https://github.com/vllm-project/vllm/issues/17248", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/pull/17623", + "name" : "https://github.com/vllm-project/vllm/pull/17623", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-6qc9-v4r8-22xg", + "name" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-6qc9-v4r8-22xg", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "vLLM is an inference and serving engine for large language models (LLMs). In versions 0.8.0 up to but excluding 0.9.0, hitting the /v1/completions API with a invalid json_schema as a Guided Param kills the vllm server. This vulnerability is similar GHSA-9hcf-v7m4-6m2j/CVE-2025-48943, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48938", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-501" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/cli/go-gh/blob/61bf393cf4aeea6d00a6251390f5f67f5b67e727/pkg/browser/browser.go", + "name" : "https://github.com/cli/go-gh/blob/61bf393cf4aeea6d00a6251390f5f67f5b67e727/pkg/browser/browser.go", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/cli/go-gh/commit/a08820a13f257d6c5b4cb86d37db559ec6d14577", + "name" : "https://github.com/cli/go-gh/commit/a08820a13f257d6c5b4cb86d37db559ec6d14577", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/cli/go-gh/security/advisories/GHSA-g9f5-x53j-h563", + "name" : "https://github.com/cli/go-gh/security/advisories/GHSA-g9f5-x53j-h563", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "go-gh is a collection of Go modules to make authoring GitHub CLI extensions easier. A security vulnerability has been identified in versions prior to 2.12.1 where an attacker-controlled GitHub Enterprise Server could result in executing arbitrary commands on a user's machine by replacing HTTP URLs provided by GitHub with local file paths for browsing. In `2.12.1`, `Browser.Browse()` has been enhanced to allow and disallow a variety of scenarios to avoid opening or executing files on the filesystem without unduly impacting HTTP URLs. No known workarounds are available other than upgrading." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48885", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-352" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/xwikisas/application-urlshortener/commit/f121a9c973fd25948e82efcb6289d53fe00a9e7d", + "name" : "https://github.com/xwikisas/application-urlshortener/commit/f121a9c973fd25948e82efcb6289d53fe00a9e7d", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/xwikisas/application-urlshortener/security/advisories/GHSA-c57g-9v2r-w8v3", + "name" : "https://github.com/xwikisas/application-urlshortener/security/advisories/GHSA-c57g-9v2r-w8v3", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "application-urlshortener create shortened URLs for XWiki pages. Versions prior to 1.2.4 are vulnerable to users with view access being able to create arbitrary pages. Any user (even guests) can create these docs, even if they don't exist already. This can enable guest users to denature the structure of wiki pages, by creating 1000's of pages with random name, that then become very difficult to handle by admins. Version 1.2.4 fixes the issue. No known workarounds are available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48883", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/chrome-php/chrome/commit/34b2b8d1691f4e3940b1e1e95d388fffe81169c8", + "name" : "https://github.com/chrome-php/chrome/commit/34b2b8d1691f4e3940b1e1e95d388fffe81169c8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/chrome-php/chrome/pull/691", + "name" : "https://github.com/chrome-php/chrome/pull/691", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/chrome-php/chrome/security/advisories/GHSA-3432-fmrf-7vmh", + "name" : "https://github.com/chrome-php/chrome/security/advisories/GHSA-3432-fmrf-7vmh", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Chrome PHP allows users to start playing with chrome/chromium in headless mode from PHP. Prior to version 1.14.0, CSS Selector expressions are not properly encoded, which can lead to XSS (cross-site scripting) vulnerabilities. This is patched in v1.14.0. As a workaround, users can apply encoding manually to their selectors if they are unable to upgrade." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T19:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5358", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ASantsSec/CVE/issues/1", + "name" : "https://github.com/ASantsSec/CVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310652", + "name" : "VDB-310652 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310652", + "name" : "VDB-310652 | PHPGurukul/Campcodes Cyber Cafe Management System bwdates-reports-details.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586569", + "name" : "Submit #586569 | Campcodes Cyber Cafe Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-30T18:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5357", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fitoxs.com/exploit/exploit-c15b3c9a2d7b1618fc5a30df50e5a13d6275f109f1fba20465d4cdd76ee8772b.txt", + "name" : "https://fitoxs.com/exploit/exploit-c15b3c9a2d7b1618fc5a30df50e5a13d6275f109f1fba20465d4cdd76ee8772b.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://fitoxs.com/exploit/exploit-c15b3c9a2d7b1618fc5a30df50e5a13d6275f109f1fba20465d4cdd76ee8772b.txt", + "name" : "https://fitoxs.com/exploit/exploit-c15b3c9a2d7b1618fc5a30df50e5a13d6275f109f1fba20465d4cdd76ee8772b.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310651", + "name" : "VDB-310651 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310651", + "name" : "VDB-310651 | FreeFloat FTP Server PWD Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.585641", + "name" : "Submit #585641 | FreeFloat FTP Server 1.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in FreeFloat FTP Server 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component PWD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-30T18:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5054", + "ASSIGNER" : "security@ubuntu.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://ubuntu.com/security/CVE-2025-5054", + "name" : "https://ubuntu.com/security/CVE-2025-5054", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://ubuntu.com/security/notices/USN-7545-1", + "name" : "https://ubuntu.com/security/notices/USN-7545-1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt", + "name" : "https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces.\n\n\n\n\nWhen handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1)." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T18:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48887", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1333" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/vllm-project/vllm/commit/4fc1bf813ad80172c1db31264beaef7d93fe0601", + "name" : "https://github.com/vllm-project/vllm/commit/4fc1bf813ad80172c1db31264beaef7d93fe0601", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/pull/18454", + "name" : "https://github.com/vllm-project/vllm/pull/18454", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25", + "name" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25", + "name" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-w6q7-j642-7c25", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "vLLM, an inference and serving engine for large language models (LLMs), has a Regular Expression Denial of Service (ReDoS) vulnerability in the file `vllm/entrypoints/openai/tool_parsers/pythonic_tool_parser.py` of versions 0.6.4 up to but excluding 0.9.0. The root cause is the use of a highly complex and nested regular expression for tool call detection, which can be exploited by an attacker to cause severe performance degradation or make the service unavailable. The pattern contains multiple nested quantifiers, optional groups, and inner repetitions which make it vulnerable to catastrophic backtracking. Version 0.9.0 contains a patch for the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T18:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-26226", + "ASSIGNER" : "browser-security@yandex-team.ru" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://yandex.com/bugbounty/i/hall-of-fame-browser/", + "name" : "https://yandex.com/bugbounty/i/hall-of-fame-browser/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A use after free memory corruption issue exists in Yandex Browser for Desktop prior to version 24.4.0.682" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T18:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5356", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fitoxs.com/exploit/exploit-a9c9f7b4f50efc4b4be32e7ec4d3f7dfd7390e9be4ff168d9ab7a0eb911f8f3a.txt", + "name" : "https://fitoxs.com/exploit/exploit-a9c9f7b4f50efc4b4be32e7ec4d3f7dfd7390e9be4ff168d9ab7a0eb911f8f3a.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310650", + "name" : "VDB-310650 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310650", + "name" : "VDB-310650 | FreeFloat FTP Server BYE Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.585639", + "name" : "Submit #585639 | FreeFloat FTP Server 1.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. Affected is an unknown function of the component BYE Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-30T17:15Z", + "lastModifiedDate" : "2025-06-02T17:32Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-42191", + "ASSIGNER" : "psirt@hcl.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120745", + "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120745", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a COM hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T16:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-42190", + "ASSIGNER" : "psirt@hcl.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120744", + "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120744", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a DLL hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T16:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-23589", + "ASSIGNER" : "psirt@hcl.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0121015", + "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0121015", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T16:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-13917", + "ASSIGNER" : "cvd@cert.pl" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-926" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.pl/en/posts/2025/05/CVE-2024-13915", + "name" : "https://cert.pl/en/posts/2025/05/CVE-2024-13915", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An application \"com.pri.applock\", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed ”com.pri.applock.LockUI“ activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting CVE-2024-13916) or ask the user to provide it.\n\nVendor did not provide information about vulnerable versions.\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T16:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-13916", + "ASSIGNER" : "cvd@cert.pl" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-497" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.pl/en/posts/2025/05/CVE-2024-13915", + "name" : "https://cert.pl/en/posts/2025/05/CVE-2024-13915", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An application \"com.pri.applock\", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed ”com.android.providers.settings.fingerprint.PriFpShareProvider“ content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code.\n\nVendor did not provide information about vulnerable versions.\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T16:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-13915", + "ASSIGNER" : "cvd@cert.pl" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-926" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.pl/en/posts/2025/05/CVE-2024-13915", + "name" : "https://cert.pl/en/posts/2025/05/CVE-2024-13915", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Android based smartphones from vendors such as Ulefone and Krüger&Matz contain \"com.pri.factorytest\" application preloaded onto devices during manufacturing process.\nThe application \"com.pri.factorytest\" (version name: 1.0, version code: 1) exposes a ”com.pri.factorytest.emmc.FactoryResetService“ service allowing any application to perform a factory reset of the device. \nApplication update did not increment the APK version. Instead, it was bundled in OS builds released later than December 2024 (Ulefone) and most probably March 2025 (Krüger&Matz, although the vendor has not confirmed it, so newer releases might be vulnerable as well)." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T16:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4992", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Service Items Management in Service Process Engineer from Release 3DEXPERIENCE R2024x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4991", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting 3D Markup in Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4990", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Change Governance in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4989", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Requirements in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4988", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Results Analytics in Multidisciplinary Optimization Engineer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4986", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Model Definition in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4985", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Risk Management in Project Portfolio Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4984", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting City Discover in City Referential Manager on Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4983", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting City Referential in City Referential Manager on Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3611", + "ASSIGNER" : "responsibledisclosure@mattermost.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://mattermost.com/security-updates", + "name" : "https://mattermost.com/security-updates", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Mattermost versions 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly enforce access control restrictions for System Manager roles, allowing authenticated users with System Manager privileges to view team details they should not have access to via direct API requests to team endpoints, even when explicitly configured with 'No access' to Teams in the System Console." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3230", + "ASSIGNER" : "responsibledisclosure@mattermost.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://mattermost.com/security-updates", + "name" : "https://mattermost.com/security-updates", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fails to properly invalidate personal access tokens upon user deactivation, allowing deactivated users to maintain full system access by exploiting access token validation flaws via continued usage of previously issued tokens." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2571", + "ASSIGNER" : "responsibledisclosure@mattermost.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://mattermost.com/security-updates", + "name" : "https://mattermost.com/security-updates", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to clear Google OAuth credentials when converting user accounts to bot accounts, allowing attackers to gain unauthorized access to bot accounts via the Google OAuth signup flow." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1792", + "ASSIGNER" : "responsibledisclosure@mattermost.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://mattermost.com/security-updates", + "name" : "https://mattermost.com/security-updates", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Mattermost versions 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to properly enforce access controls for guest users accessing channel member information, allowing authenticated guest users to view metadata about members of public channels via the channel members API endpoint." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-0602", + "ASSIGNER" : "3DS.Information-Security@3ds.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.3ds.com/vulnerability/advisories", + "name" : "https://www.3ds.com/vulnerability/advisories", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Compare in Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-7097", + "ASSIGNER" : "security@wso2.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3574/", + "name" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3574/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization.\n\nExploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-7096", + "ASSIGNER" : "security@wso2.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3573/", + "name" : "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3573/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met:\n * SOAP admin services are accessible to the attacker.\n * The deployment includes an internally used attribute that is not part of the default WSO2 product configuration.\n * At least one custom role exists with non-default permissions.\n * The attacker has knowledge of the custom role and the internal attribute used in the deployment.\n\n\nExploiting this vulnerability allows malicious actors to assign higher privileges to self-registered users, bypassing intended access control mechanisms." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T15:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4598", + "ASSIGNER" : "secalert@redhat.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-364" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://access.redhat.com/security/cve/CVE-2025-4598", + "name" : "https://access.redhat.com/security/cve/CVE-2025-4598", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2369242", + "name" : "RHBZ#2369242", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/29/3", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/29/3", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector" : "LOCAL", + "attackComplexity" : "HIGH", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.7, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.0, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-30T14:15Z", + "lastModifiedDate" : "2025-05-30T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48331", + "ASSIGNER" : "audit@patchstack.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-201" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://patchstack.com/database/wordpress/plugin/woocommerce-orders-customers-exporter/vulnerability/wordpress-woocommerce-orders-customers-exporter-5-0-sensitive-data-exposure-vulnerability?_s_id=cve", + "name" : "https://patchstack.com/database/wordpress/plugin/woocommerce-orders-customers-exporter/vulnerability/wordpress-woocommerce-orders-customers-exporter-5-0-sensitive-data-exposure-vulnerability?_s_id=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Vanquish WooCommerce Orders & Customers Exporter allows Retrieve Embedded Sensitive Data.This issue affects WooCommerce Orders & Customers Exporter: from n/a through 5.0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T14:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4433", + "ASSIGNER" : "security@devolutions.net" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://devolutions.net/security/advisories/DEVO-2025-0010/", + "name" : "https://devolutions.net/security/advisories/DEVO-2025-0010/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper access control in user group management in Devolutions Server 2025.1.7.0 and earlier allows a non-administrative user with both \"User Management\" and \"User Group Management\" permissions to perform privilege escalation by adding users to groups with administrative privileges." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T13:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40909", + "ASSIGNER" : "cve-request@security.metacpan.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/23/1", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/23/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/30/4", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/30/4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://www.openwall.com/lists/oss-security/2025/06/02/2", + "name" : "http://www.openwall.com/lists/oss-security/2025/06/02/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://www.openwall.com/lists/oss-security/2025/06/02/5", + "name" : "http://www.openwall.com/lists/oss-security/2025/06/02/5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://www.openwall.com/lists/oss-security/2025/06/02/6", + "name" : "http://www.openwall.com/lists/oss-security/2025/06/02/6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://www.openwall.com/lists/oss-security/2025/06/02/7", + "name" : "http://www.openwall.com/lists/oss-security/2025/06/02/7", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://www.openwall.com/lists/oss-security/2025/06/03/1", + "name" : "http://www.openwall.com/lists/oss-security/2025/06/03/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226", + "name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e", + "name" : "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch", + "name" : "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Perl/perl5/issues/10387", + "name" : "https://github.com/Perl/perl5/issues/10387", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Perl/perl5/issues/23010", + "name" : "https://github.com/Perl/perl5/issues/23010", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads", + "name" : "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/22/2", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/22/2", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. \n\nThis may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.\n\nThe bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T13:15Z", + "lastModifiedDate" : "2025-06-03T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2500", + "ASSIGNER" : "cybersecurity@hitachienergy.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-256" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000212&LanguageCode=en&DocumentPartId=&Action=Launch", + "name" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000212&LanguageCode=en&DocumentPartId=&Action=Launch", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability exists in the SOAP Web services of the Asset \nSuite versions listed below. If successfully exploited, an attacker \ncould gain unauthorized access to the product and the time window of a possible password attack could be expanded." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T13:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1484", + "ASSIGNER" : "cybersecurity@hitachienergy.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-184" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000212&LanguageCode=en&DocumentPartId=&Action=Launch", + "name" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000212&LanguageCode=en&DocumentPartId=&Action=Launch", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability exists in the media upload component of the Asset \nSuite versions listed below. If successfully exploited an attacker \ncould impact the confidentiality or integrity of the system. An attacker can use this vulnerability to construct a request that will \ncause JavaScript code supplied by the attacker to execute within \nthe user’s browser in the context of that user’s session with the \napplication." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T13:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5190", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-288" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/browse-as/tags/0.2/browse-as.php#L115", + "name" : "https://plugins.trac.wordpress.org/browser/browse-as/tags/0.2/browse-as.php#L115", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/browse-as/tags/0.2/browse-as.php#L92", + "name" : "https://plugins.trac.wordpress.org/browser/browse-as/tags/0.2/browse-as.php#L92", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8f5722b0-0d54-4c44-b168-a886da1077cb?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8f5722b0-0d54-4c44-b168-a886da1077cb?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Browse As plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.2. This is due to incorrect authentication checking in the 'IS_BA_Browse_As::notice' function with the 'is_ba_original_user_COOKIEHASH' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the user id." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-30T12:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4944", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/changeset/3302784/", + "name" : "https://plugins.trac.wordpress.org/changeset/3302784/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/lastudio-element-kit/#developers", + "name" : "https://wordpress.org/plugins/lastudio-element-kit/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/68ae8404-6dfa-4b13-b2a6-bd4554f1043f?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/68ae8404-6dfa-4b13-b2a6-bd4554f1043f?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Compare and Google Maps widgets in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-30T12:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4597", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/woo-slider-pro-drag-drop-slider-builder-for-woocommerce/trunk/inc/actions.php#L111", + "name" : "https://plugins.trac.wordpress.org/browser/woo-slider-pro-drag-drop-slider-builder-for-woocommerce/trunk/inc/actions.php#L111", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1eaee0f6-968c-4004-83e7-f79baf3ff88d?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1eaee0f6-968c-4004-83e7-f79baf3ff88d?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Woo Slider Pro – Drag Drop Slider Builder For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the woo_slide_pro_delete_draft_preview AJAX action in all versions up to, and including, 1.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "HIGH", + "availabilityImpact" : "NONE", + "baseScore" : 6.5, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-30T12:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1763", + "ASSIGNER" : "cve@gitlab.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/521718", + "name" : "GitLab Issue #521718", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://hackerone.com/reports/3016600", + "name" : "HackerOne Bug Bounty Report #3016600", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue has been discovered in GitLab EE that allows for cross-site-scripting attack and content security policy bypass in a user's browser under specific conditions, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T11:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5235", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/opensheetmusicdisplay/opensheetmusicdisplay/blob/develop/CHANGELOG.md", + "name" : "https://github.com/opensheetmusicdisplay/opensheetmusicdisplay/blob/develop/CHANGELOG.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/opensheetmusicdisplay/trunk/opensheetmusicdisplay.php#L473", + "name" : "https://plugins.trac.wordpress.org/browser/opensheetmusicdisplay/trunk/opensheetmusicdisplay.php#L473", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3301757/", + "name" : "https://plugins.trac.wordpress.org/changeset/3301757/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3301757/#file48", + "name" : "https://plugins.trac.wordpress.org/changeset/3301757/#file48", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/opensheetmusicdisplay/#developers", + "name" : "https://wordpress.org/plugins/opensheetmusicdisplay/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a45417ce-d5dd-4706-adbb-d44670de6eb7?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a45417ce-d5dd-4706-adbb-d44670de6eb7?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The OpenSheetMusicDisplay plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘className’ parameter in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-30T10:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5142", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-352" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/simple-page-access-restriction/tags/1.0.31/includes/admin/settings/settings.php#L16", + "name" : "https://plugins.trac.wordpress.org/browser/simple-page-access-restriction/tags/1.0.31/includes/admin/settings/settings.php#L16", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3300680/", + "name" : "https://plugins.trac.wordpress.org/changeset/3300680/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/simple-page-access-restriction/#developers", + "name" : "https://wordpress.org/plugins/simple-page-access-restriction/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/657e2a4d-7e10-495d-8352-1adc0cb89e83?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/657e2a4d-7e10-495d-8352-1adc0cb89e83?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Simple Page Access Restriction plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.31. This is due to missing nonce validation and capability checks in the settings save handler in the settings.php script. This makes it possible for unauthenticated attackers to (1) enable or disable access protection on all post types or taxonomies, (2) force every new page/post to be public or private, regardless of meta-box settings, (3) cause a silent wipe of all plugin data when it’s later removed, or (4) to conduct URL redirection attacks via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "HIGH", + "availabilityImpact" : "NONE", + "baseScore" : 6.5, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-30T10:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4636", + "ASSIGNER" : "cve_disclosure@tech.gov.sg" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jct-aq.com/products/airpointer2d/", + "name" : "https://jct-aq.com/products/airpointer2d/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Due to excessive privileges granted to the web user running the airpointer web platform, a malicious actor that gains control of the this user would be able to privilege escalate to the root user" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T09:15Z", + "lastModifiedDate" : "2025-05-30T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4635", + "ASSIGNER" : "cve_disclosure@tech.gov.sg" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jct-aq.com/products/airpointer2d/", + "name" : "https://jct-aq.com/products/airpointer2d/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A malicious user with administrative privileges in the web portal would be able to manipulate the Diagnostics module to obtain remote code execution on the local device as a low privileged user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T09:15Z", + "lastModifiedDate" : "2025-05-30T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4634", + "ASSIGNER" : "cve_disclosure@tech.gov.sg" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jct-aq.com/products/airpointer2d/", + "name" : "https://jct-aq.com/products/airpointer2d/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The web portal on airpointer 2.4.107-2 was vulnerable local file inclusion. A malicious user with administrative privileges in the web portal would be able to manipulate requests to view files on the filesystem" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T09:15Z", + "lastModifiedDate" : "2025-05-30T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4633", + "ASSIGNER" : "cve_disclosure@tech.gov.sg" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jct-aq.com/products/airpointer2d/", + "name" : "https://jct-aq.com/products/airpointer2d/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Default credentials were present in the web portal for Airpointer 2.4.107-2, allowing an unauthenticated malicious actor to log in via the web portal" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T09:15Z", + "lastModifiedDate" : "2025-05-30T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48912", + "ASSIGNER" : "security@apache.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/30/3", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/30/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://lists.apache.org/thread/ms2t2oq218hb7l628trsogo4fj7h1135", + "name" : "https://lists.apache.org/thread/ms2t2oq218hb7l628trsogo4fj7h1135", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An authenticated malicious actor using specially crafted requests could bypass row level security configuration by injecting SQL into 'sqlExpression' fields. This allowed the execution of sub-queries to evade parsing defenses ultimately granting unauthorized access to data.\n\nThis issue affects Apache Superset: before 4.1.2.\n\nUsers are recommended to upgrade to version 4.1.2, which fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T09:15Z", + "lastModifiedDate" : "2025-05-31T01:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48334", + "ASSIGNER" : "audit@patchstack.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://patchstack.com/database/wordpress/plugin/woo-slider-pro-drag-drop-slider-builder-for-woocommerce/vulnerability/wordpress-woo-slider-pro-1-12-arbitrary-content-deletion-vulnerability?_s_id=cve", + "name" : "https://patchstack.com/database/wordpress/plugin/woo-slider-pro-drag-drop-slider-builder-for-woocommerce/vulnerability/wordpress-woo-slider-pro-1-12-arbitrary-content-deletion-vulnerability?_s_id=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Missing Authorization vulnerability in BinaryCarpenter Woo Slider Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woo Slider Pro: from n/a through 1.12. Affected action \"woo_slide_pro_delete_slider\"." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T09:15Z", + "lastModifiedDate" : "2025-05-30T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5236", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/ninjateam-telegram/trunk/blocks/src/init.php#L130", + "name" : "https://plugins.trac.wordpress.org/browser/ninjateam-telegram/trunk/blocks/src/init.php#L130", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3302588/", + "name" : "https://plugins.trac.wordpress.org/changeset/3302588/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/ninjateam-telegram/#developers", + "name" : "https://wordpress.org/plugins/ninjateam-telegram/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/725feb15-aa9b-4c00-bb95-ee0616000a14?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/725feb15-aa9b-4c00-bb95-ee0616000a14?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The NinjaTeam Chat for Telegram plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘username’ parameter in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-30T08:15Z", + "lastModifiedDate" : "2025-05-30T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4431", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/featured-image-plus/trunk/inc/admin/block-editor/block-editor-actions.php#L204", + "name" : "https://plugins.trac.wordpress.org/browser/featured-image-plus/trunk/inc/admin/block-editor/block-editor-actions.php#L204", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/209341fa-6761-4bc4-a921-afa98495a087?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/209341fa-6761-4bc4-a921-afa98495a087?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Featured Image Plus – Quick & Bulk Edit with Unsplash plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fip_save_attach_featured function in all versions up to, and including, 1.6.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update featured image of any post." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-30T08:15Z", + "lastModifiedDate" : "2025-05-30T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4943", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/assets/js/addons/wrapper-links.min.js", + "name" : "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/assets/js/addons/wrapper-links.min.js", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3302784/", + "name" : "https://plugins.trac.wordpress.org/changeset/3302784/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/lastudio-element-kit/#developers", + "name" : "https://wordpress.org/plugins/lastudio-element-kit/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c5822b9-7fd0-4c39-a298-70d0debcc136?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c5822b9-7fd0-4c39-a298-70d0debcc136?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-lakit-element-link’ parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48936", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-601" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/zitadel/zitadel/commit/c097887bc5f680e12c998580fb56d98a15758f53", + "name" : "https://github.com/zitadel/zitadel/commit/c097887bc5f680e12c998580fb56d98a15758f53", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/zitadel/zitadel/security/advisories/GHSA-93m4-mfpg-c3xf", + "name" : "https://github.com/zitadel/zitadel/security/advisories/GHSA-93m4-mfpg-c3xf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Zitadel is open-source identity infrastructure software. Prior to versions 2.70.12, 2.71.10, and 3.2.2, a potential vulnerability exists in the password reset mechanism. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. If an attacker can manipulate these headers (e.g., via host header injection), they could cause ZITADEL to generate a password reset link pointing to a malicious domain controlled by the attacker. If the user clicks this manipulated link in the email, the secret reset code embedded in the URL can be captured by the attacker. This captured code could then be used to reset the user's password and gain unauthorized access to their account. This specific attack vector is mitigated for accounts that have Multi-Factor Authentication (MFA) or Passwordless authentication enabled. This issue has been patched in versions 2.70.12, 2.71.10, and 3.2.2." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48880", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-362" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/3f5bb2841f7de3303bc3cb00930a28440754d122", + "name" : "https://github.com/freescout-help-desk/freescout/commit/3f5bb2841f7de3303bc3cb00930a28440754d122", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-9vf2-mg4j-4v7f", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-9vf2-mg4j-4v7f", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.181, when an administrative account is a deleting a user, there is the the possibility of a race condition occurring. This issue has been patched in version 1.8.181." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48875", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/508dda16853a39fcb6c2b46ea7b7f442d5f7eda7", + "name" : "https://github.com/freescout-help-desk/freescout/commit/508dda16853a39fcb6c2b46ea7b7f442d5f7eda7", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mjjx-rv96-w9hq", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mjjx-rv96-w9hq", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.181, the system's incorrect validation of last_name and first_name during profile data updates allows for the injection of arbitrary JavaScript code, which will be executed in a flesh-message when the data is deleted, potentially leading to a Cross-Site Scripting (XSS) vulnerability. This issue has been patched in version 1.8.181." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48865", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/fabiolb/fabio/commit/fdaf1e966162e9dd3b347ffdd0647b39dc71a1a3", + "name" : "https://github.com/fabiolb/fabio/commit/fdaf1e966162e9dd3b347ffdd0647b39dc71a1a3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/fabiolb/fabio/releases/tag/v1.6.6", + "name" : "https://github.com/fabiolb/fabio/releases/tag/v1.6.6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf", + "name" : "https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf", + "name" : "https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers. Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities. Some of these custom headers can be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been patched in version 1.6.6." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48492", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582", + "name" : "https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582", + "name" : "https://github.com/GetSimpleCMS-CE/GetSimpleCMS-CE/security/advisories/GHSA-g435-p72m-p582", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "GetSimple CMS is a content management system. In versions starting from 3.3.16 to 3.3.21, an authenticated user with access to the Edit component can inject arbitrary PHP into a component file and execute it via a crafted query string, resulting in Remote Code Execution (RCE). This issue is set to be patched in version 3.3.22." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48489", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jqjf-f566-485j", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jqjf-f566-485j", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to insufficient data validation and sanitization during data reception. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48488", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2m76-538h-7hf9", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2m76-538h-7hf9", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, deleting the file .htaccess allows an attacker to upload an HTML file containing malicious JavaScript code to the server, which can result in a Cross-Site Scripting (XSS) vulnerability. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48487", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-wg2q-m2fj-x6j4", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-wg2q-m2fj-x6j4", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, when creating a translation of a phrase that appears in a flash-message after a completed action, it is possible to inject a payload to exploit XSS vulnerability. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48486", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-9jpm-xrpc-cv66", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-9jpm-xrpc-cv66", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the cross-site scripiting (XSS) vulnerability is caused by the lack of input validation and sanitization in both \\Session::flash and __, allowing user input to be executed without proper filtering. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48485", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-556q-w535-xxg8", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-556q-w535-xxg8", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data when an authenticated user updates the profile of an arbitrary customer. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47697", + "ASSIGNER" : "vultures@jpcert.or.jp" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-602" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jvn.jp/en/jp/JVN51394666/", + "name" : "https://jvn.jp/en/jp/JVN51394666/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.uchida.co.jp/wivia/support02.html", + "name" : "https://www.uchida.co.jp/wivia/support02.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Client-side enforcement of server-side security issue exists in wivia 5 all versions. If exploited, an unauthenticated attacker may bypass authentication and operate the affected device as the moderator user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41406", + "ASSIGNER" : "vultures@jpcert.or.jp" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jvn.jp/en/jp/JVN51394666/", + "name" : "https://jvn.jp/en/jp/JVN51394666/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.uchida.co.jp/wivia/support02.html", + "name" : "https://www.uchida.co.jp/wivia/support02.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Cross-site scripting vulnerability exists in wivia 5 all versions. If exploited, when a user connects to the affected device with a specific operation, an arbitrary script may be executed on the web browser of the moderator user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41385", + "ASSIGNER" : "vultures@jpcert.or.jp" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-78" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jvn.jp/en/jp/JVN51394666/", + "name" : "https://jvn.jp/en/jp/JVN51394666/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.uchida.co.jp/wivia/support02.html", + "name" : "https://www.uchida.co.jp/wivia/support02.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An OS Command Injection issue exists in wivia 5 all versions. If this vulnerability is exploited, an arbitrary OS command may be executed by a logged-in administrative user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T07:15Z", + "lastModifiedDate" : "2025-05-30T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5259", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/minimal-share-buttons/trunk/inc/class-minimal-share-buttons.php#L67", + "name" : "https://plugins.trac.wordpress.org/browser/minimal-share-buttons/trunk/inc/class-minimal-share-buttons.php#L67", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3302704%40minimal-share-buttons&old=3074272%40minimal-share-buttons&sfp_email=&sfph_mail=", + "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3302704%40minimal-share-buttons&old=3074272%40minimal-share-buttons&sfp_email=&sfph_mail=", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/minimal-share-buttons/#developers", + "name" : "https://wordpress.org/plugins/minimal-share-buttons/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ac2ac7a-4cb5-4051-bec7-a22693c50915?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ac2ac7a-4cb5-4051-bec7-a22693c50915?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Minimal Share Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ parameter in all versions up to, and including, 1.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-30T06:15Z", + "lastModifiedDate" : "2025-05-30T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4659", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-200" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/changeset/3299864/", + "name" : "https://plugins.trac.wordpress.org/changeset/3299864/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a99456c4-c828-4dc9-9375-8981eafbeb15?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a99456c4-c828-4dc9-9375-8981eafbeb15?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-30T06:15Z", + "lastModifiedDate" : "2025-05-30T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4429", + "ASSIGNER" : "contact@wpscan.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://wpscan.com/vulnerability/a487f5c9-7db6-4427-8d95-17acbfd49fd2/", + "name" : "https://wpscan.com/vulnerability/a487f5c9-7db6-4427-8d95-17acbfd49fd2/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wpscan.com/vulnerability/a487f5c9-7db6-4427-8d95-17acbfd49fd2/", + "name" : "https://wpscan.com/vulnerability/a487f5c9-7db6-4427-8d95-17acbfd49fd2/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Gearside Developer Dashboard WordPress plugin through 1.0.72 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T06:15Z", + "lastModifiedDate" : "2025-05-30T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48889", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/gradio-app/gradio/security/advisories/GHSA-8jw3-6x8j-v96g", + "name" : "https://github.com/gradio-app/gradio/security/advisories/GHSA-8jw3-6x8j-v96g", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/gradio-app/gradio/security/advisories/GHSA-8jw3-6x8j-v96g", + "name" : "https://github.com/gradio-app/gradio/security/advisories/GHSA-8jw3-6x8j-v96g", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Gradio is an open-source Python package that allows quick building of demos and web application for machine learning models, API, or any arbitrary Python function. Prior to version 5.31.0, an arbitrary file copy vulnerability in Gradio's flagging feature allows unauthenticated attackers to copy any readable file from the server's filesystem. While attackers can't read these copied files, they can cause DoS by copying large files (like /dev/urandom) to fill disk space. This issue has been patched in version 5.31.0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T06:15Z", + "lastModifiedDate" : "2025-05-30T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48881", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/valtimo-platform/valtimo-backend-libraries/security/advisories/GHSA-965r-9cg9-g42p", + "name" : "https://github.com/valtimo-platform/valtimo-backend-libraries/security/advisories/GHSA-965r-9cg9-g42p", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Valtimo is a platform for Business Process Automation. In versions starting from 11.0.0.RELEASE to 11.3.3.RELEASE and 12.0.0.RELEASE to 12.12.0.RELEASE, all objects for which an object-management configuration exists can be listed, viewed, edited, created or deleted by unauthorised users. If object-urls are exposed via other channels, the contents of these objects can be viewed independent of object-management configurations. At time of publication, no known patches exist. A workaround for this issue involves overriding the endpoint security as defined in ObjectenApiHttpSecurityConfigurer and ObjectManagementHttpSecurityConfigurer. Depending on the implementation, this could result in loss of functionality." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T06:15Z", + "lastModifiedDate" : "2025-05-30T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48490", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-20" + }, { + "lang" : "en", + "value" : "CWE-1173" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Lomkit/laravel-rest-api/commit/88b14587b4efd7e59d7379658c606d325bb513b4", + "name" : "https://github.com/Lomkit/laravel-rest-api/commit/88b14587b4efd7e59d7379658c606d325bb513b4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Lomkit/laravel-rest-api/pull/172", + "name" : "https://github.com/Lomkit/laravel-rest-api/pull/172", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Lomkit/laravel-rest-api/security/advisories/GHSA-69rh-hccr-cxrj", + "name" : "https://github.com/Lomkit/laravel-rest-api/security/advisories/GHSA-69rh-hccr-cxrj", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Laravel Rest Api is an API generator. Prior to version 2.13.0, a validation bypass vulnerability was discovered where multiple validations defined for the same attribute could be silently overridden. Due to how the framework merged validation rules across multiple contexts (such as index, store, and update actions), malicious actors could exploit this behavior by crafting requests that bypass expected validation rules, potentially injecting unexpected or dangerous parameters into the application. This could lead to unauthorized data being accepted or processed by the API, depending on the context in which the validation was bypassed. This issue has been patched in version 2.13.0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T06:15Z", + "lastModifiedDate" : "2025-05-30T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41235", + "ASSIGNER" : "security@vmware.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://spring.io/security/cve-2025-41235", + "name" : "https://spring.io/security/cve-2025-41235", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Spring Cloud Gateway Server forwards the X-Forwarded-For and Forwarded headers from untrusted proxies." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T06:15Z", + "lastModifiedDate" : "2025-05-30T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48484", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-w3j9-7fhq-m8x7", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-w3j9-7fhq-m8x7", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data in the conversation POST data body. This issue has been patched in version 1.8.178." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48483", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-352" + }, { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-g2vq-qwx2-pc2m", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-g2vq-qwx2-pc2m", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application is vulnerable to Cross-Site Scripting (XSS) attacks due to incorrect input validation and sanitization of user-input data during mail signature sanitization. An attacker can inject arbitrary HTML code, including JavaScript scripts, into the page processed by the user's browser, allowing them to steal sensitive data, hijack user sessions, or conduct other malicious activities. Additionally, if an administrator accesses one of these emails with a modified signature, it could result in a subsequent Cross-Site Request Forgery (CSRF) vulnerability. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48482", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-841" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-7fjp-538q-9vrf", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-7fjp-538q-9vrf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, there is a mass assignment vulnerability. The Customer object is updated using the fill() method, which processes fields such as channel and channel_id. However, the fill() method is called with all client-provided data, including unexpected values for channel and channel_id, leading to a mass assignment vulnerability. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48481", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-841" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jgj2-x749-5wc7", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jgj2-x749-5wc7", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, an attacker with an unactivated email invitation containing invite_hash, can exploit this vulnerability to self-activate their account, despite it being blocked or deleted, by leveraging the invitation link from the email to gain initial access to the account. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48480", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-841" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-pfjf-43mp-3gp2", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-pfjf-43mp-3gp2", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, an authorized user with the administrator role or with the privilege User::PERM_EDIT_USERS can create a user, specifying the path to the user's avatar ../.htaccess during creation, and then delete the user's avatar, resulting in the deletion of the file .htaccess in the folder /storage/app/public. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48479", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-841" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-627h-pc3c-w68h", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-627h-pc3c-w68h", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the laravel-translation-manager package does not correctly validate user input, enabling the deletion of any directory, given sufficient access rights. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48478", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-841" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/d2048f59a899dbcfc9a71bb98549ead81cdb62a5", + "name" : "https://github.com/freescout-help-desk/freescout/commit/d2048f59a899dbcfc9a71bb98549ead81cdb62a5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-fqjj-79j2-8qx6", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-fqjj-79j2-8qx6", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, insufficient input validation during user creation has resulted in a mass assignment vulnerability, allowing an attacker to manipulate all fields of the object, which are enumerated in the $fillable array (the User object), when creating a new user. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48477", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-841" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2c82-qx7x-35h8", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2c82-qx7x-35h8", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application's logic requires the user to perform a correct sequence of actions to implement a functional capability, but the application allows access to the functional capability without correctly completing one or more actions in the sequence. The leaves the attributes of Mailbox object able to be changed by the fill method. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48476", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-841" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-7h5m-q39p-h849", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-7h5m-q39p-h849", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, when adding and editing user records using the fill() method, there is no check for the absence of the password field in the data coming from the user, which leads to a mass-assignment vulnerability. As a result, a user with the right to edit other users of the system can change their password, and then log in to the system using the set password. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T05:15Z", + "lastModifiedDate" : "2025-05-30T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48491", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-798" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/aryan6673/project-ai/commit/142252c43f1dacb3fed99e3336f5cd863b028bc2", + "name" : "https://github.com/aryan6673/project-ai/commit/142252c43f1dacb3fed99e3336f5cd863b028bc2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/aryan6673/project-ai/commit/1de910f353eb2a68c980149b906e7495459296ad", + "name" : "https://github.com/aryan6673/project-ai/commit/1de910f353eb2a68c980149b906e7495459296ad", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/aryan6673/project-ai/commit/54a69c3ccd301d35f3d54f4844d9910e609beb73", + "name" : "https://github.com/aryan6673/project-ai/commit/54a69c3ccd301d35f3d54f4844d9910e609beb73", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/aryan6673/project-ai/commit/7f3b93f9aa9085d5413b4019172b0e56676346d7", + "name" : "https://github.com/aryan6673/project-ai/commit/7f3b93f9aa9085d5413b4019172b0e56676346d7", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/aryan6673/project-ai/commit/8db90e3d9777850741804533ebde5824b4a5795c", + "name" : "https://github.com/aryan6673/project-ai/commit/8db90e3d9777850741804533ebde5824b4a5795c", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/aryan6673/project-ai/commit/99e0e0718edb0e59c5d3c5a69903b87c69fcfe7a", + "name" : "https://github.com/aryan6673/project-ai/commit/99e0e0718edb0e59c5d3c5a69903b87c69fcfe7a", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/aryan6673/project-ai/commit/ab67979a46b0e343dc20a95a2b65d3c4994c31e7", + "name" : "https://github.com/aryan6673/project-ai/commit/ab67979a46b0e343dc20a95a2b65d3c4994c31e7", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/aryan6673/project-ai/commit/c1fb156418d98a1e6c60bb680db57e9558785093", + "name" : "https://github.com/aryan6673/project-ai/commit/c1fb156418d98a1e6c60bb680db57e9558785093", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/aryan6673/project-ai/security/advisories/GHSA-8486-vrcp-69rv", + "name" : "https://github.com/aryan6673/project-ai/security/advisories/GHSA-8486-vrcp-69rv", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Project AI is a platform designed to create AI agents. Prior to the pre-beta version, a hardcoded API key was present in the source code. This issue has been patched in the pre-beta version." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T04:15Z", + "lastModifiedDate" : "2025-05-30T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48381", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-201" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/cvat-ai/cvat/commit/7136c99fb2c3a5cb2d8c3ca54b4201b9fa6aab5a", + "name" : "https://github.com/cvat-ai/cvat/commit/7136c99fb2c3a5cb2d8c3ca54b4201b9fa6aab5a", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/cvat-ai/cvat/security/advisories/GHSA-7484-2gfm-852p", + "name" : "https://github.com/cvat-ai/cvat/security/advisories/GHSA-7484-2gfm-852p", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. In versions starting from 2.4.0 to before 2.38.0, an authenticated CVAT user may be able to retrieve the IDs and names of all tasks, projects, labels, and the IDs of all jobs and quality reports on the CVAT instance. In addition, if the instance contains many resources of a particular type, retrieving this information may tie up system resources, denying access to legitimate users. This issue has been patched in version 2.38.0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T04:15Z", + "lastModifiedDate" : "2025-05-30T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48068", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1385" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/vercel/next.js/security/advisories/GHSA-3h52-269p-cp9r", + "name" : "https://github.com/vercel/next.js/security/advisories/GHSA-3h52-269p-cp9r", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vercel.com/changelog/cve-2025-48068", + "name" : "https://vercel.com/changelog/cve-2025-48068", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Next.js is a React framework for building full-stack web applications. In versions starting from 13.0 to before 15.2.2, Next.js may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while npm run dev is active. This issue has been patched in version 15.2.2." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T04:15Z", + "lastModifiedDate" : "2025-05-30T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47952", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/traefik/traefik/commit/08d5dfee0164aa54dd44a467870042e18e8d3f00", + "name" : "https://github.com/traefik/traefik/commit/08d5dfee0164aa54dd44a467870042e18e8d3f00", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/traefik/traefik/releases/tag/v2.11.25", + "name" : "https://github.com/traefik/traefik/releases/tag/v2.11.25", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/traefik/traefik/releases/tag/v3.4.1", + "name" : "https://github.com/traefik/traefik/releases/tag/v3.4.1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/traefik/traefik/security/advisories/GHSA-vrch-868g-9jx5", + "name" : "https://github.com/traefik/traefik/security/advisories/GHSA-vrch-868g-9jx5", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded string in its path, it’s possible to target a backend, exposed using another router, by-passing the middlewares chain. This issue has been patched in versions 2.11.25 and 3.4.1." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T04:15Z", + "lastModifiedDate" : "2025-05-30T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-44906", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md", + "name" : "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md", + "name" : "https://github.com/madao123123/crash_report/blob/main/jhead/jhead.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "jhead v3.08 was discovered to contain a heap-use-after-free via the ProcessFile function at jhead.c." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T04:15Z", + "lastModifiedDate" : "2025-05-30T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-44905", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc5.md", + "name" : "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc5.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc5.md", + "name" : "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc5.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5Z__filter_scaleoffset function." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T04:15Z", + "lastModifiedDate" : "2025-05-30T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-44904", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc1.md", + "name" : "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc1.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc1.md", + "name" : "https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc1.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5VM_memcpyvv function." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T04:15Z", + "lastModifiedDate" : "2025-05-30T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48757", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.lovable.dev/changelog", + "name" : "https://docs.lovable.dev/changelog", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gist.github.com/lhchavez/625ee42a6c408a850d35e50f8e649de9", + "name" : "https://gist.github.com/lhchavez/625ee42a6c408a850d35e50f8e649de9", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://mattpalmer.io/posts/CVE-2025-48757/", + "name" : "https://mattpalmer.io/posts/CVE-2025-48757/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://x.com/danialasaria/status/1911862269996118272", + "name" : "https://x.com/danialasaria/status/1911862269996118272", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An insufficient database Row-Level Security policy in Lovable through 2025-04-15 allows remote unauthenticated attackers to read or write to arbitrary database tables of generated sites." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T03:15Z", + "lastModifiedDate" : "2025-05-30T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-44619", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://tinxy.com", + "name" : "http://tinxy.com", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://wifi.com", + "name" : "http://wifi.com", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Tinxy WiFi Lock Controller v1 RF was discovered to be configured to transmit on an open Wi-Fi network, allowing attackers to join the network without authentication." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T03:15Z", + "lastModifiedDate" : "2025-05-30T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-44614", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29", + "name" : "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Tinxy WiFi Lock Controller v1 RF was discovered to store users' sensitive information, including credentials and mobile phone numbers, in plaintext." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T03:15Z", + "lastModifiedDate" : "2025-05-30T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-44612", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29", + "name" : "https://github.com/ShravanSinghRathore/Tinxy/wiki/1.-WiFi-Lock-Controller-v1-RF-%281%E2%80%909%29", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Tinxy WiFi Lock Controller v1 RF was discovered to transmit sensitive information in plaintext, including control information and device credentials, allowing attackers to possibly intercept and access sensitive information via a man-in-the-middle attack." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T03:15Z", + "lastModifiedDate" : "2025-05-30T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-12224", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1887898", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1887898", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1887898", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1887898", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://rustsec.org/advisories/RUSTSEC-2024-0421.html", + "name" : "https://rustsec.org/advisories/RUSTSEC-2024-0421.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T02:15Z", + "lastModifiedDate" : "2025-05-30T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2020-36846", + "ASSIGNER" : "cve-request@security.metacpan.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/advisories/GHSA-5v8v-66v8-mwm7", + "name" : "https://github.com/advisories/GHSA-5v8v-66v8-mwm7", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6", + "name" : "https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/google/brotli/pull/826", + "name" : "https://github.com/google/brotli/pull/826", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/timlegge/perl-IO-Compress-Brotli/blob/8b44c83b23bb4658179e1494af4b725a1bc476bc/Changes#L52", + "name" : "https://github.com/timlegge/perl-IO-Compress-Brotli/blob/8b44c83b23bb4658179e1494af4b725a1bc476bc/Changes#L52", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://nvd.nist.gov/vuln/detail/CVE-2020-8927", + "name" : "https://nvd.nist.gov/vuln/detail/CVE-2020-8927", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library.  Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a \"one-shot\" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend to use the \"streaming\" API as opposed to the \"one-shot\" API, and impose chunk size limits." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T01:15Z", + "lastModifiedDate" : "2025-05-30T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46352", + "ASSIGNER" : "ics-cert@hq.dhs.gov" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-798" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-03", + "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-03", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.consiliumsafety.com/en/support/", + "name" : "https://www.consiliumsafety.com/en/support/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The CS5000 Fire Panel is vulnerable due to a hard-coded password that \nruns on a VNC server and is visible as a string in the binary \nresponsible for running VNC. This password cannot be altered, allowing \nanyone with knowledge of it to gain remote access to the panel. Such \naccess could enable an attacker to operate the panel remotely, \npotentially putting the fire panel into a non-functional state and \ncausing serious safety issues." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T00:15Z", + "lastModifiedDate" : "2025-05-30T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41438", + "ASSIGNER" : "ics-cert@hq.dhs.gov" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1188" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-03", + "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-03", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.consiliumsafety.com/en/support/", + "name" : "https://www.consiliumsafety.com/en/support/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The CS5000 Fire Panel is vulnerable due to a default account that exists\n on the panel. Even though it is possible to change this by SSHing into \nthe device, it has remained unchanged on every installed system \nobserved. This account is not root but holds high-level permissions that\n could severely impact the device's operation if exploited." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T00:15Z", + "lastModifiedDate" : "2025-05-30T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1907", + "ASSIGNER" : "ics-cert@hq.dhs.gov" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-306" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-04", + "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-04", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.instantel.com/service-and-support/contact-technical-support", + "name" : "https://www.instantel.com/service-and-support/contact-technical-support", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Instantel Micromate lacks authentication on a configuration port which could allow an attacker to execute commands if connected." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-30T00:15Z", + "lastModifiedDate" : "2025-05-30T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5332", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://1000projects.org/", + "name" : "https://1000projects.org/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/ubfbuz3/cve/issues/16", + "name" : "https://github.com/ubfbuz3/cve/issues/16", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/ubfbuz3/cve/issues/16", + "name" : "https://github.com/ubfbuz3/cve/issues/16", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310505", + "name" : "VDB-310505 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310505", + "name" : "VDB-310505 | 1000 Projects Online Notice Board index.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.586566", + "name" : "Submit #586566 | https://1000projects.org Online Notice Board Project Synopsis v1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in 1000 Projects Online Notice Board 1.0 and classified as critical. This issue affects some unknown processing of the file /index.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T23:15Z", + "lastModifiedDate" : "2025-05-30T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5331", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/r3ng4f/PCMan_1/blob/main/exploit02.txt", + "name" : "https://github.com/r3ng4f/PCMan_1/blob/main/exploit02.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/r3ng4f/PCMan_1/blob/main/exploit02.txt", + "name" : "https://github.com/r3ng4f/PCMan_1/blob/main/exploit02.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310504", + "name" : "VDB-310504 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310504", + "name" : "VDB-310504 | PCMan FTP Server NLST Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.585404", + "name" : "Submit #585404 | PCMan FTP Server 2.0.7 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. This vulnerability affects unknown code of the component NLST Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-05-30T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5330", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/r3ng4f/FreeFloat_1/blob/main/01-exploit.txt", + "name" : "https://github.com/r3ng4f/FreeFloat_1/blob/main/01-exploit.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/r3ng4f/FreeFloat_1/blob/main/01-exploit.txt", + "name" : "https://github.com/r3ng4f/FreeFloat_1/blob/main/01-exploit.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310503", + "name" : "VDB-310503 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310503", + "name" : "VDB-310503 | FreeFloat FTP Server RETR Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.585402", + "name" : "Submit #585402 | FreeFloat FTP Server 1.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. This affects an unknown part of the component RETR Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-05-30T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5307", + "ASSIGNER" : "ics-cert@hq.dhs.gov" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-125" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-148-01", + "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-148-01", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.santesoft.com/win/sante-dicom-viewer-pro/download.html", + "name" : "https://www.santesoft.com/win/sante-dicom-viewer-pro/download.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Santesoft Sante DICOM Viewer Pro contains a memory corruption vulnerability. A local attacker could exploit this issue to potentially disclose information and to execute arbitrary code on affected installations of Sante DICOM Viewer Pro." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-05-29T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31264", + "ASSIGNER" : "product-security@apple.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.apple.com/en-us/122373", + "name" : "https://support.apple.com/en-us/122373", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122374", + "name" : "https://support.apple.com/en-us/122374", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122375", + "name" : "https://support.apple.com/en-us/122375", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An authentication issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with physical access to a locked device may be able to view sensitive user information." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding" : "14.0", + "versionEndExcluding" : "14.7.5", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "13.7.5", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding" : "15.0", + "versionEndExcluding" : "15.4", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-06-02T15:59Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31263", + "ASSIGNER" : "product-security@apple.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.apple.com/en-us/122373", + "name" : "https://support.apple.com/en-us/122373", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4. An app may be able to corrupt coprocessor memory." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "15.4", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-06-02T15:59Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31261", + "ASSIGNER" : "product-security@apple.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.apple.com/en-us/122373", + "name" : "https://support.apple.com/en-us/122373", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122374", + "name" : "https://support.apple.com/en-us/122374", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122375", + "name" : "https://support.apple.com/en-us/122375", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding" : "14.0", + "versionEndExcluding" : "14.7.5", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "13.7.5", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding" : "15.0", + "versionEndExcluding" : "15.4", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-06-02T16:00Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31231", + "ASSIGNER" : "product-security@apple.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.apple.com/en-us/122373", + "name" : "https://support.apple.com/en-us/122373", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to read sensitive location information." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "15.4", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-06-02T16:00Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31199", + "ASSIGNER" : "product-security@apple.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.apple.com/en-us/122371", + "name" : "https://support.apple.com/en-us/122371", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122373", + "name" : "https://support.apple.com/en-us/122373", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122378", + "name" : "https://support.apple.com/en-us/122378", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, visionOS 2.4, macOS Sequoia 15.4. An app may be able to access sensitive user data." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "18.4", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "18.4", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "2.4", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "15.4", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-06-02T16:00Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31198", + "ASSIGNER" : "product-security@apple.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.apple.com/en-us/122373", + "name" : "https://support.apple.com/en-us/122373", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122374", + "name" : "https://support.apple.com/en-us/122374", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122375", + "name" : "https://support.apple.com/en-us/122375", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A path handling issue was addressed with improved validation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding" : "14.0", + "versionEndExcluding" : "14.7.5", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "13.7.5", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding" : "15.0", + "versionEndExcluding" : "15.4", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-06-02T16:00Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31189", + "ASSIGNER" : "product-security@apple.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.apple.com/en-us/122373", + "name" : "https://support.apple.com/en-us/122373", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122374", + "name" : "https://support.apple.com/en-us/122374", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122375", + "name" : "https://support.apple.com/en-us/122375", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding" : "14.0", + "versionEndExcluding" : "14.7.5", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "13.7.5", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding" : "15.0", + "versionEndExcluding" : "15.4", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-06-02T16:00Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-30466", + "ASSIGNER" : "product-security@apple.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://support.apple.com/en-us/122371", + "name" : "https://support.apple.com/en-us/122371", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122373", + "name" : "https://support.apple.com/en-us/122373", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122378", + "name" : "https://support.apple.com/en-us/122378", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + }, { + "url" : "https://support.apple.com/en-us/122379", + "name" : "https://support.apple.com/en-us/122379", + "refsource" : "", + "tags" : [ "Release Notes", "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "This issue was addressed through improved state management. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, visionOS 2.4, macOS Sequoia 15.4. A website may be able to bypass Same Origin Policy." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "18.4", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "18.4", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "2.4", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "18.4", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "15.4", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T22:15Z", + "lastModifiedDate" : "2025-06-02T16:00Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5328", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md", + "name" : "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md", + "name" : "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310498", + "name" : "VDB-310498 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310498", + "name" : "VDB-310498 | chshcms mccms Backups.php restore_del path traversal", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582297", + "name" : "Submit #582297 | https://gitee.com/chshcms/mccms mccms 2.7 Arbitrary File Deletion", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in chshcms mccms 2.7. It has been declared as critical. This vulnerability affects the function restore_del of the file /sys/apps/controllers/admin/Backups.php. The manipulation of the argument dirs leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T21:15Z", + "lastModifiedDate" : "2025-05-30T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5327", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-918" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E5%89%8D%E5%8F%B0SSRF.md", + "name" : "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E5%89%8D%E5%8F%B0SSRF.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E5%89%8D%E5%8F%B0SSRF.md", + "name" : "https://github.com/caigo8/CVE-md/blob/main/Mccms_V2.7/%E5%89%8D%E5%8F%B0SSRF.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310497", + "name" : "VDB-310497 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310497", + "name" : "VDB-310497 | chshcms mccms Gf.php index server-side request forgery", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582295", + "name" : "Submit #582295 | https://gitee.com/chshcms/mccms mccms 2.7 Server-Side Request Forgery", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in chshcms mccms 2.7. It has been classified as critical. This affects the function index of the file sys/apps/controllers/api/Gf.php. The manipulation of the argument pic leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-29T21:15Z", + "lastModifiedDate" : "2025-05-29T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5326", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-20" + }, { + "lang" : "en", + "value" : "CWE-502" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310496", + "name" : "VDB-310496 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310496", + "name" : "VDB-310496 | zhilink ???(??)?????? ADP Application Developer Platform ??????? verifyToken deserialization", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.581277", + "name" : "Submit #581277 | ???(??)?????? ADP??????? zhlink V1.0.0 Command Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in zhilink ???(??)?????? ADP Application Developer Platform ??????? 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the file /adpweb/wechat/verifyToken/. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5325", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310495", + "name" : "VDB-310495 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310495", + "name" : "VDB-310495 | zhilink ???(??)?????? ADP Application Developer Platform ??????? testService special elements used in a template engine", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.581275", + "name" : "https://vuldb.com/?submit.581275", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.581275", + "name" : "Submit #581275 | ???(??)?????? ADP??????? zhlink V1.0.0 Command Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in zhilink ???(??)?????? ADP Application Developer Platform ??????? 1.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /adpweb/a/ica/api/service/rfa/testService. The manipulation leads to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4967", + "ASSIGNER" : "psirt@esri.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-918" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-2-patch", + "name" : "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2025-update-2-patch", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Esri Portal for ArcGIS 11.4 and prior allows a remote, unauthenticated attacker to bypass the Portal’s SSRF protections." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "NONE", + "baseScore" : 9.1, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.2 + } + }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47933", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/argoproj/argo-cd/commit/a5b4041a79c54bc7b3d090805d070bcdb9a9e4d1", + "name" : "https://github.com/argoproj/argo-cd/commit/a5b4041a79c54bc7b3d090805d070bcdb9a9e4d1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2hj5-g64g-fp6p", + "name" : "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2hj5-g64g-fp6p", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Prior to versions 2.13.8, 2.14.13, and 3.0.4, an attacker can perform arbitrary actions on behalf of the victim via the API. Due to the improper filtering of URL protocols in the repository page, an attacker can achieve cross-site scripting with permission to edit the repository. This issue has been patched in versions 2.13.8, 2.14.13, and 3.0.4." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47288", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-200" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/discourse/discourse-policy/commit/6b4390fe486408cc86ccea6b091406cfac6c5b8f", + "name" : "https://github.com/discourse/discourse-policy/commit/6b4390fe486408cc86ccea6b091406cfac6c5b8f", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/discourse/discourse-policy/security/advisories/GHSA-jc5r-rm2j-mh4x", + "name" : "https://github.com/discourse/discourse-policy/security/advisories/GHSA-jc5r-rm2j-mh4x", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Discourse Policy plugin gives the ability to confirm users have seen or done something. Prior to version 0.1.1, if there was a policy posted to a public topic that was tied to a private group then the group members could be shown to non-group members. This issue has been patched in version 0.1.1. A workaround involves moving any policy topics with private groups to restricted categories." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3050", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-770" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7235073", + "name" : "https://www.ibm.com/support/pages/node/7235073", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 could allow an authenticated user to cause a denial of service when using Q replication due to the improper allocation of CPU resources." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "HIGH", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.6, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2518", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-789" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7235072", + "name" : "https://www.ibm.com/support/pages/node/7235072", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 \n\nis vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "HIGH", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.6, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-54952", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/noobone123/RouterOS-issues/blob/main/README.md", + "name" : "https://github.com/noobone123/RouterOS-issues/blob/main/README.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "MikroTik RouterOS 6.40.5, the SMB service contains a memory corruption vulnerability. Remote, unauthenticated attackers can exploit this issue by sending specially crafted packets, triggering a null pointer dereference. This leads to a Remote Denial of Service (DoS), rendering the SMB service unavailable." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-29T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-49350", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-121" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7235069", + "name" : "https://www.ibm.com/support/pages/node/7235069", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 6.5, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-29T20:15Z", + "lastModifiedDate" : "2025-05-30T16:31Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5324", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-404" + }, { + "lang" : "en", + "value" : "CWE-401" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Aiyakami/CVE-1/issues/3", + "name" : "https://github.com/Aiyakami/CVE-1/issues/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Aiyakami/CVE-1/tree/main/test1", + "name" : "https://github.com/Aiyakami/CVE-1/tree/main/test1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310494", + "name" : "VDB-310494 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310494", + "name" : "VDB-310494 | TechPowerUp GPU-Z 0x8000645C IOCTL GPU-Z.sys sub_140001880 memory leak", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.580513", + "name" : "Submit #580513 | TechPowerUp GPU-Z 2.23.0 Information Exposure", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as problematic, was found in TechPowerUp GPU-Z 2.23.0. Affected is the function sub_140001880 in the library GPU-Z.sys of the component 0x8000645C IOCTL Handler. The manipulation leads to memory leak. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 3.3, + "baseSeverity" : "LOW" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-29T19:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48336", + "ASSIGNER" : "audit@patchstack.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-502" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://patchstack.com/database/wordpress/theme/course-builder/vulnerability/wordpress-course-builder-3-6-6-php-object-injection-vulnerability?_s_id=cve", + "name" : "https://patchstack.com/database/wordpress/theme/course-builder/vulnerability/wordpress-course-builder-3-6-6-php-object-injection-vulnerability?_s_id=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Deserialization of Untrusted Data vulnerability in ThimPress Course Builder allows Object Injection.This issue affects Course Builder: from n/a before 3.6.6." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T19:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46701", + "ASSIGNER" : "security@apache.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/29/4", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/29/4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j", + "name" : "https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T19:15Z", + "lastModifiedDate" : "2025-05-30T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-32752", + "ASSIGNER" : "secure@dell.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-312" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.dell.com/support/kbdoc/en-us/000325632/dsa-2025-225", + "name" : "https://www.dell.com/support/kbdoc/en-us/000325632/dsa-2025-225", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T19:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5323", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/superboy-zjc/31ecea91b304b8dd9871ad507467ca61", + "name" : "https://gist.github.com/superboy-zjc/31ecea91b304b8dd9871ad507467ca61", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gist.github.com/superboy-zjc/31ecea91b304b8dd9871ad507467ca61", + "name" : "https://gist.github.com/superboy-zjc/31ecea91b304b8dd9871ad507467ca61", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gist.github.com/superboy-zjc/31ecea91b304b8dd9871ad507467ca61#proof-of-concept", + "name" : "https://gist.github.com/superboy-zjc/31ecea91b304b8dd9871ad507467ca61#proof-of-concept", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310493", + "name" : "VDB-310493 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310493", + "name" : "VDB-310493 | fossasia open-event-server Mail Verification mail.py send_email_change_user_email reliance on obfuscation or encryption of security-relevant inputs without integrity checking", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.580256", + "name" : "Submit #580256 | open-event-server v1.19.1 Reliance on Obfuscation or Encryption of Security-Relevant Input", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as problematic, has been found in fossasia open-event-server 1.19.1. This issue affects the function send_email_change_user_email of the file /fossasia/open-event-server/blob/development/app/api/helpers/mail.py of the component Mail Verification Handler. The manipulation leads to reliance on obfuscation or encryption of security-relevant inputs without integrity checking. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T18:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46823", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/openmrs/openmrs-module-fhir2/releases/tag/2.5.0", + "name" : "https://github.com/openmrs/openmrs-module-fhir2/releases/tag/2.5.0", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/openmrs/openmrs-module-fhir2/security/advisories/GHSA-g5vq-w8v2-4x9j", + "name" : "https://github.com/openmrs/openmrs-module-fhir2/security/advisories/GHSA-g5vq-w8v2-4x9j", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "openmrs-module-fhir2 provides the FHIR REST API and related services for OpenMRS, an open medical records system. In versions of the FHIR2 module prior to 2.5.0, privileges were not always correctly checked, which means that unauthorized users may have been able to add or edit data they were not supposed to be able to. All implementers should update to FHIR2 2.5.0 or newer as soon as is feasible to receive a patch." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T18:15Z", + "lastModifiedDate" : "2025-05-29T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-29632", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/free5gc/free5gc/issues/657", + "name" : "https://github.com/free5gc/free5gc/issues/657", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/OHnogood/CVE-2025-29632/", + "name" : "https://github.com/OHnogood/CVE-2025-29632/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Buffer Overflow vulnerability in Free5gc v.4.0.0 allows a remote attacker to cause a denial of service via the AMF, NGAP, security.go, handler_generated.go, handleInitialUEMessageMain, DecodePlainNasNoIntegrityCheck, GetSecurityHeaderType components" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T18:15Z", + "lastModifiedDate" : "2025-05-29T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-53423", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/kjw6855/abeecc798d138b49537393e1fd3a5e96", + "name" : "https://gist.github.com/kjw6855/abeecc798d138b49537393e1fd3a5e96", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wiki.onosproject.org/pages/viewpage.action?pageId=16122675", + "name" : "https://wiki.onosproject.org/pages/viewpage.action?pageId=16122675", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue in Open Network Foundation ONOS v2.7.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted packets." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T18:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-41591", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/kjw6855/9764e3f51b89119473e4d2c4f64dca27", + "name" : "https://gist.github.com/kjw6855/9764e3f51b89119473e4d2c4f64dca27", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wiki.onosproject.org/pages/viewpage.action?pageId=16122675", + "name" : "https://wiki.onosproject.org/pages/viewpage.action?pageId=16122675", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue in Open Network Foundation ONOS v2.7.0 allows attackers to create fake IP/MAC addresses and potentially execute a man-in-the-middle attack on communications between fake and real hosts." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T18:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48475", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/1f154ce039618ed5abd960c97619c23534c0717a", + "name" : "https://github.com/freescout-help-desk/freescout/commit/1f154ce039618ed5abd960c97619c23534c0717a", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-xvch-f75c-8w8q", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-xvch-f75c-8w8q", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the System does not provide a check on which \"clients\" of the System an authorized user can view and edit, and which ones they cannot. As a result, an authorized user who does not have access to any of the existing mailboxes, as well as to any of the existing conversations, has the ability to view and edit the System's clients. The limitation of client visibility can be implemented by the limit_user_customer_visibility setting, however, in the specified scenarios, there is no check for the presence of this setting. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T17:15Z", + "lastModifiedDate" : "2025-05-29T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46722", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1023" + }, { + "lang" : "en", + "value" : "CWE-1288" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/vllm-project/vllm/commit/99404f53c72965b41558aceb1bc2380875f5d848", + "name" : "https://github.com/vllm-project/vllm/commit/99404f53c72965b41558aceb1bc2380875f5d848", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/pull/17378", + "name" : "https://github.com/vllm-project/vllm/pull/17378", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-c65p-x677-fgj6", + "name" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-c65p-x677-fgj6", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "vLLM is an inference and serving engine for large language models (LLMs). In versions starting from 0.7.0 to before 0.9.0, in the file vllm/multimodal/hasher.py, the MultiModalHasher class has a security and data integrity issue in its image hashing method. Currently, it serializes PIL.Image.Image objects using only obj.tobytes(), which returns only the raw pixel data, without including metadata such as the image’s shape (width, height, mode). As a result, two images of different sizes (e.g., 30x100 and 100x30) with the same pixel byte sequence could generate the same hash value. This may lead to hash collisions, incorrect cache hits, and even data leakage or security risks. This issue has been patched in version 0.9.0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T17:15Z", + "lastModifiedDate" : "2025-05-29T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46570", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-208" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/vllm-project/vllm/commit/77073c77bc2006eb80ea6d5128f076f5e6c6f54f", + "name" : "https://github.com/vllm-project/vllm/commit/77073c77bc2006eb80ea6d5128f076f5e6c6f54f", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/pull/17045", + "name" : "https://github.com/vllm-project/vllm/pull/17045", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-4qjh-9fv9-r85r", + "name" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-4qjh-9fv9-r85r", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "vLLM is an inference and serving engine for large language models (LLMs). Prior to version 0.9.0, when a new prompt is processed, if the PageAttention mechanism finds a matching prefix chunk, the prefill process speeds up, which is reflected in the TTFT (Time to First Token). These timing differences caused by matching chunks are significant enough to be recognized and exploited. This issue has been patched in version 0.9.0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T17:15Z", + "lastModifiedDate" : "2025-05-29T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-51392", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/manisashank/CVE-Publish/blob/main/CVE-2024-51392.md", + "name" : "https://github.com/manisashank/CVE-Publish/blob/main/CVE-2024-51392.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/OpenKnowledgeMaps/Headstart", + "name" : "https://github.com/OpenKnowledgeMaps/Headstart", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue in OpenKnowledgeMaps Headstart v7 allows a remote attacker to escalate privileges via the url parameter of the getPDF.php component" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T17:15Z", + "lastModifiedDate" : "2025-05-29T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48474", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/87cdb65d6b632b5292bcac2d7a209f6e36ae51d7", + "name" : "https://github.com/freescout-help-desk/freescout/commit/87cdb65d6b632b5292bcac2d7a209f6e36ae51d7", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-9wc4-vchw-mr3m", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-9wc4-vchw-mr3m", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application incorrectly checks user access rights for conversations. Users with show_only_assigned_conversations enabled can assign themselves to an arbitrary conversation from the mailbox to which they have access, thereby bypassing the restriction on viewing conversations. This issue has been patched in version 1.8.180." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T16:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48473", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/2552a2b84248824b73c35b2699aa86da644eea1a", + "name" : "https://github.com/freescout-help-desk/freescout/commit/2552a2b84248824b73c35b2699aa86da644eea1a", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-3x75-7856-r794", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-3x75-7856-r794", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, when creating a conversation from a message in another conversation, there is no check to ensure that the user has the ability to view this message. Thus, the user can view arbitrary messages from other mailboxes or from other conversations to which they do not have access (access restriction to conversations is implemented by the show_only_assigned_conversations setting, which is also not checked). This issue has been patched in version 1.8.179." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T16:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48472", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/01c91d2086ddd56778698e557138a178b2f59916", + "name" : "https://github.com/freescout-help-desk/freescout/commit/01c91d2086ddd56778698e557138a178b2f59916", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-f62r-8354-8pqg", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-f62r-8354-8pqg", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-f62r-8354-8pqg", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-f62r-8354-8pqg", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, there is no check to ensure that the user is disabling notifications for the mailbox to which they already have access. Moreover, the code explicitly implements functionality that if the user does not have access to the mailbox, then after disabling (enabling) notifications for this mailbox, the user will gain access to it. This issue has been patched in version 1.8.179." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T16:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48471", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-434" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/e136660e8dbc220454b8d3f646dd1b144e49e9ed", + "name" : "https://github.com/freescout-help-desk/freescout/commit/e136660e8dbc220454b8d3f646dd1b144e49e9ed", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, the application does not check or performs insufficient checking of files uploaded to the application. This allows files to be uploaded with the phtml and phar extensions, which can lead to remote code execution if the Apache web server is used. This issue has been patched in version 1.8.179." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T16:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48390", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/fb33d672a2d67f5a2b3cf69c80945267f17908b2", + "name" : "https://github.com/freescout-help-desk/freescout/commit/fb33d672a2d67f5a2b3cf69c80945267f17908b2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-5324-cw55-gwj5", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-5324-cw55-gwj5", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, FreeScout is vulnerable to code injection due to insufficient validation of user input in the php_path parameter. The backticks characters are not removed, as well as tabulation is not removed. When checking user input, the file_exists function is also called to check for the presence of such a file (folder) in the file system. A user with the administrator role can create a translation for the language, which will create a folder in the file system. Further in tools.php, the user can specify the path to this folder as php_path, which will lead to the execution of code in backticks. This issue has been patched in version 1.8.178." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T16:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48389", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-502" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/f7548a7076a0b6e109001069d6be223fbd96c61e", + "name" : "https://github.com/freescout-help-desk/freescout/commit/f7548a7076a0b6e109001069d6be223fbd96c61e", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jmpv-8q3h-2m8v", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jmpv-8q3h-2m8v", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, FreeScout is vulnerable to deserialization of untrusted data due to insufficient validation. Through the set function, a string with a serialized object can be passed, and when getting an option through the get method, deserialization will occur, which will allow arbitrary code execution This issue has been patched in version 1.8.178." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T16:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-45474", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.yuque.com/morysummer/vx41bz/ptnnp4eema601rvz", + "name" : "https://www.yuque.com/morysummer/vx41bz/ptnnp4eema601rvz", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "maccms10 v2025.1000.4047 is vulnerable to Server-side request forgery (SSRF) in Email Settings." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T16:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3913", + "ASSIGNER" : "responsibledisclosure@mattermost.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://mattermost.com/security-updates", + "name" : "https://mattermost.com/security-updates", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to properly validate permissions when changing team privacy settings, allowing team administrators without the 'invite user' permission to access and modify team invite IDs via the /api/v4/teams/:teamId/privacy endpoint." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T16:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5334", + "ASSIGNER" : "security@devolutions.net" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://devolutions.net/security/advisories/DEVO-2025-0009", + "name" : "https://devolutions.net/security/advisories/DEVO-2025-0009", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Exposure of private personal information to an unauthorized actor in the user vaults component of Devolutions Remote Desktop Manager\nallows an authenticated user to gain unauthorized access to private personal information. \n\n\n\nUnder specific circumstances, entries may be unintentionally moved from user vaults to shared vaults when edited by their owners, making them accessible to other users.\n\n\n\n\nThis issue affects the following versions :\n\n * Remote Desktop Manager Windows 2025.1.34.0 and earlier" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T15:15Z", + "lastModifiedDate" : "2025-05-29T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5321", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/superboy-zjc/1fc4747a0ac77a1edc8c32e1d4edc54c", + "name" : "https://gist.github.com/superboy-zjc/1fc4747a0ac77a1edc8c32e1d4edc54c", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310492", + "name" : "VDB-310492 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310492", + "name" : "VDB-310492 | aimhubio aim run_view Object query.py RestrictedPythonQuery privilege escalation", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.580253", + "name" : "Submit #580253 | aim 3.29.1 Sandbox Issue", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in aimhubio aim up to 3.29.1. This vulnerability affects the function RestrictedPythonQuery of the file /aim/storage/query.py of the component run_view Object Handler. The manipulation of the argument Abfrage leads to erweiterte Rechte. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T15:15Z", + "lastModifiedDate" : "2025-06-01T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4081", + "ASSIGNER" : "cvd@cert.pl" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-276" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.pl/en/posts/2025/05/tcc-bypass/", + "name" : "https://cert.pl/en/posts/2025/05/tcc-bypass/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.blackmagicdesign.com/products/davinciresolve", + "name" : "https://www.blackmagicdesign.com/products/davinciresolve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Use of entitlement \"com.apple.security.cs.disable-library-validation\" and lack of launch and library load constraints allows to substitute a legitimate dylib with malicious one. A local attacker with unprivileged access can execute the application with altered dynamic library successfully bypassing Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.\n\nThis issue affects DaVinci Resolve on macOS in all versions.\nLast tested version: 19.1.3" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T15:15Z", + "lastModifiedDate" : "2025-05-29T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48748", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://community.netwrix.com/t/adv-2025-013-hard-coded-password-in-netwrix-directory-manager-formerly-imanami-groupid-v10-and-earlier/13945", + "name" : "https://community.netwrix.com/t/adv-2025-013-hard-coded-password-in-netwrix-directory-manager-formerly-imanami-groupid-v10-and-earlier/13945", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Netwrix Directory Manager (formerly Imanami GroupID) through v.10.0.7784.0 has a hard-coded password." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T15:15Z", + "lastModifiedDate" : "2025-05-29T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-22654", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/TimChan2001/4f25915b9952e8e3453db5cf72185b88", + "name" : "https://gist.github.com/TimChan2001/4f25915b9952e8e3453db5cf72185b88", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/appneta/tcpreplay/issues/827", + "name" : "https://github.com/appneta/tcpreplay/issues/827", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/appneta/tcpreplay/issues/827", + "name" : "https://github.com/appneta/tcpreplay/issues/827", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "tcpreplay v4.4.4 was discovered to contain an infinite loop via the tcprewrite function at get.c." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T15:15Z", + "lastModifiedDate" : "2025-05-30T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-22653", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/TimChan2001/03e5792b15d0a34bfaad970e37c17660", + "name" : "https://gist.github.com/TimChan2001/03e5792b15d0a34bfaad970e37c17660", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/yasm/yasm/issues/247", + "name" : "https://github.com/yasm/yasm/issues/247", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "yasm commit 9defefae was discovered to contain a NULL pointer dereference via the yasm_section_bcs_append function at section.c." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T15:15Z", + "lastModifiedDate" : "2025-05-29T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5320", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/superboy-zjc/aa3dfa161d7b19d8a53ab4605792f2fe", + "name" : "https://gist.github.com/superboy-zjc/aa3dfa161d7b19d8a53ab4605792f2fe", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gist.github.com/superboy-zjc/aa3dfa161d7b19d8a53ab4605792f2fe#proof-of-concept-poc", + "name" : "https://gist.github.com/superboy-zjc/aa3dfa161d7b19d8a53ab4605792f2fe#proof-of-concept-poc", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310491", + "name" : "VDB-310491 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310491", + "name" : "VDB-310491 | gradio-app gradio CORS is_valid_origin privilege escalation", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.580250", + "name" : "Submit #580250 | gradio <=5.29.1 Cross-Site Request Forgery", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as problematic has been found in gradio-app gradio up to 5.29.1. This affects the function is_valid_origin of the component CORS Handler. The manipulation of the argument localhost_aliases leads to erweiterte Rechte. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-06-01T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46080", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/yggcwhat/CVE-2025-46080/", + "name" : "https://github.com/yggcwhat/CVE-2025-46080/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/yggcwhat/test2/blob/main/README.md", + "name" : "https://github.com/yggcwhat/test2/blob/main/README.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "HuoCMS V3.5.1 has a File Upload Vulnerability. An attacker can exploit this flaw to bypass whitelist restrictions and craft malicious files with specific suffixes, thereby gaining control of the server." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46078", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/yggcwhat/CVE-2025-46078/", + "name" : "https://github.com/yggcwhat/CVE-2025-46078/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/yggcwhat/test/blob/main/README.md", + "name" : "https://github.com/yggcwhat/test/blob/main/README.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "HuoCMS V3.5.1 and before is vulnerable to file upload, which allows attackers to take control of the target server" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37999", + "ASSIGNER" : "cve@kernel.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://git.kernel.org/stable/c/61e0fc3312309867e5a3495329dad0286d2a5703", + "name" : "https://git.kernel.org/stable/c/61e0fc3312309867e5a3495329dad0286d2a5703", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/bbfe756dc3062c1e934f06e5ba39c239aa953b92", + "name" : "https://git.kernel.org/stable/c/bbfe756dc3062c1e934f06e5ba39c239aa953b92", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/c26076197df348c84cc23e5962d61902e072a0f5", + "name" : "https://git.kernel.org/stable/c/c26076197df348c84cc23e5962d61902e072a0f5", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/erofs/fileio: call erofs_onlinefolio_split() after bio_add_folio()\n\nIf bio_add_folio() fails (because it is full),\nerofs_fileio_scan_folio() needs to submit the I/O request via\nerofs_fileio_rq_submit() and allocate a new I/O request with an empty\n`struct bio`. Then it retries the bio_add_folio() call.\n\nHowever, at this point, erofs_onlinefolio_split() has already been\ncalled which increments `folio->private`; the retry will call\nerofs_onlinefolio_split() again, but there will never be a matching\nerofs_onlinefolio_end() call. This leaves the folio locked forever\nand all waiters will be stuck in folio_wait_bit_common().\n\nThis bug has been added by commit ce63cb62d794 (\"erofs: support\nunencoded inodes for fileio\"), but was practically unreachable because\nthere was room for 256 folios in the `struct bio` - until commit\n9f74ae8c9ac9 (\"erofs: shorten bvecs[] for file-backed mounts\") which\nreduced the array capacity to 16 folios.\n\nIt was now trivial to trigger the bug by manually invoking readahead\nfrom userspace, e.g.:\n\n posix_fadvise(fd, 0, st.st_size, POSIX_FADV_WILLNEED);\n\nThis should be fixed by invoking erofs_onlinefolio_split() only after\nbio_add_folio() has succeeded. This is safe: asynchronous completions\ninvoking erofs_onlinefolio_end() will not unlock the folio because\nerofs_fileio_scan_folio() is still holding a reference to be released\nby erofs_onlinefolio_end() at the end." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37998", + "ASSIGNER" : "cve@kernel.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://git.kernel.org/stable/c/0236742bd959332181c1fcc41a05b7b709180501", + "name" : "https://git.kernel.org/stable/c/0236742bd959332181c1fcc41a05b7b709180501", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/47f7f00cf2fa3137d5c0416ef1a71bdf77901395", + "name" : "https://git.kernel.org/stable/c/47f7f00cf2fa3137d5c0416ef1a71bdf77901395", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/4fa672cbce9c86c3efb8621df1ae580d47813430", + "name" : "https://git.kernel.org/stable/c/4fa672cbce9c86c3efb8621df1ae580d47813430", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/6beb6835c1fbb3f676aebb51a5fee6b77fed9308", + "name" : "https://git.kernel.org/stable/c/6beb6835c1fbb3f676aebb51a5fee6b77fed9308", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/bca8df998cce1fead8cbc69144862eadc2e34c87", + "name" : "https://git.kernel.org/stable/c/bca8df998cce1fead8cbc69144862eadc2e34c87", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/ec334aaab74705cc515205e1da3cb369fdfd93cd", + "name" : "https://git.kernel.org/stable/c/ec334aaab74705cc515205e1da3cb369fdfd93cd", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: Fix unsafe attribute parsing in output_userspace()\n\nThis patch replaces the manual Netlink attribute iteration in\noutput_userspace() with nla_for_each_nested(), which ensures that only\nwell-formed attributes are processed." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37997", + "ASSIGNER" : "cve@kernel.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://git.kernel.org/stable/c/6e002ecc1c8cfdfc866b9104ab7888da54613e59", + "name" : "https://git.kernel.org/stable/c/6e002ecc1c8cfdfc866b9104ab7888da54613e59", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/82c1eb32693bc48251d92532975e19160987e5b9", + "name" : "https://git.kernel.org/stable/c/82c1eb32693bc48251d92532975e19160987e5b9", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/8478a729c0462273188263136880480729e9efca", + "name" : "https://git.kernel.org/stable/c/8478a729c0462273188263136880480729e9efca", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/a3dfec485401943e315c394c29afe2db8f9481d6", + "name" : "https://git.kernel.org/stable/c/a3dfec485401943e315c394c29afe2db8f9481d6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/aa77294b0f73bb8265987591460cd25b8722c3df", + "name" : "https://git.kernel.org/stable/c/aa77294b0f73bb8265987591460cd25b8722c3df", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/e2ab67672b2288521a6146034a971f9a82ffc5c5", + "name" : "https://git.kernel.org/stable/c/e2ab67672b2288521a6146034a971f9a82ffc5c5", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: fix region locking in hash types\n\nRegion locking introduced in v5.6-rc4 contained three macros to handle\nthe region locks: ahash_bucket_start(), ahash_bucket_end() which gave\nback the start and end hash bucket values belonging to a given region\nlock and ahash_region() which should give back the region lock belonging\nto a given hash bucket. The latter was incorrect which can lead to a\nrace condition between the garbage collector and adding new elements\nwhen a hash type of set is defined with timeouts." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37996", + "ASSIGNER" : "cve@kernel.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://git.kernel.org/stable/c/157dbc4a321f5bb6f8b6c724d12ba720a90f1a7c", + "name" : "https://git.kernel.org/stable/c/157dbc4a321f5bb6f8b6c724d12ba720a90f1a7c", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/a26d50f8a4a5049e956984797b5d0dedea4bbb18", + "name" : "https://git.kernel.org/stable/c/a26d50f8a4a5049e956984797b5d0dedea4bbb18", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Fix uninitialized memcache pointer in user_mem_abort()\n\nCommit fce886a60207 (\"KVM: arm64: Plumb the pKVM MMU in KVM\") made the\ninitialization of the local memcache variable in user_mem_abort()\nconditional, leaving a codepath where it is used uninitialized via\nkvm_pgtable_stage2_map().\n\nThis can fail on any path that requires a stage-2 allocation\nwithout transition via a permission fault or dirty logging.\n\nFix this by making sure that memcache is always valid." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37995", + "ASSIGNER" : "cve@kernel.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://git.kernel.org/stable/c/31d8df3f303c3ae9115230820977ef8c35c88808", + "name" : "https://git.kernel.org/stable/c/31d8df3f303c3ae9115230820977ef8c35c88808", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd", + "name" : "https://git.kernel.org/stable/c/9e7b49ce4f9d0cb5b6e87db9e07a2fb9e754b0dd", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/a6aeb739974ec73e5217c75a7c008a688d3d5cf1", + "name" : "https://git.kernel.org/stable/c/a6aeb739974ec73e5217c75a7c008a688d3d5cf1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/d63851049f412cdfadaeef7a7eaef5031d11c1e9", + "name" : "https://git.kernel.org/stable/c/d63851049f412cdfadaeef7a7eaef5031d11c1e9", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/f1c71b4bd721a4ea21da408806964b10468623f2", + "name" : "https://git.kernel.org/stable/c/f1c71b4bd721a4ea21da408806964b10468623f2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/faa9059631d3491d699c69ecf512de9e1a3d6649", + "name" : "https://git.kernel.org/stable/c/faa9059631d3491d699c69ecf512de9e1a3d6649", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nmodule: ensure that kobject_put() is safe for module type kobjects\n\nIn 'lookup_or_create_module_kobject()', an internal kobject is created\nusing 'module_ktype'. So call to 'kobject_put()' on error handling\npath causes an attempt to use an uninitialized completion pointer in\n'module_kobject_release()'. In this scenario, we just want to release\nkobject without an extra synchronization required for a regular module\nunloading process, so adding an extra check whether 'complete()' is\nactually required makes 'kobject_put()' safe." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37994", + "ASSIGNER" : "cve@kernel.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://git.kernel.org/stable/c/076ab0631ed4928905736f1701e25f1e722bc086", + "name" : "https://git.kernel.org/stable/c/076ab0631ed4928905736f1701e25f1e722bc086", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/14f298c52188c34acde9760bf5abc669c5c36fdb", + "name" : "https://git.kernel.org/stable/c/14f298c52188c34acde9760bf5abc669c5c36fdb", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/312d79669e71283d05c05cc49a1a31e59e3d9e0e", + "name" : "https://git.kernel.org/stable/c/312d79669e71283d05c05cc49a1a31e59e3d9e0e", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/5ad298d6d4aebe1229adba6427e417e89a5208d8", + "name" : "https://git.kernel.org/stable/c/5ad298d6d4aebe1229adba6427e417e89a5208d8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/7804c4d63edfdd5105926cc291e806e8f4ce01b5", + "name" : "https://git.kernel.org/stable/c/7804c4d63edfdd5105926cc291e806e8f4ce01b5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/e9b63faf5c97deb43fc39a52edbc39d626cc14bf", + "name" : "https://git.kernel.org/stable/c/e9b63faf5c97deb43fc39a52edbc39d626cc14bf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: displayport: Fix NULL pointer access\n\nThis patch ensures that the UCSI driver waits for all pending tasks in the\nucsi_displayport_work workqueue to finish executing before proceeding with\nthe partner removal." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37993", + "ASSIGNER" : "cve@kernel.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://git.kernel.org/stable/c/2ecce25ea296f328d79070ee36229a15aeeb7aca", + "name" : "https://git.kernel.org/stable/c/2ecce25ea296f328d79070ee36229a15aeeb7aca", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/7d5379cfecfdd665e4206bc4f19824656388779f", + "name" : "https://git.kernel.org/stable/c/7d5379cfecfdd665e4206bc4f19824656388779f", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/dcaeeb8ae84c5506ebc574732838264f3887738c", + "name" : "https://git.kernel.org/stable/c/dcaeeb8ae84c5506ebc574732838264f3887738c", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: m_can: m_can_class_allocate_dev(): initialize spin lock on device probe\n\nThe spin lock tx_handling_spinlock in struct m_can_classdev is not\nbeing initialized. This leads the following spinlock bad magic\ncomplaint from the kernel, eg. when trying to send CAN frames with\ncansend from can-utils:\n\n| BUG: spinlock bad magic on CPU#0, cansend/95\n| lock: 0xff60000002ec1010, .magic: 00000000, .owner: /-1, .owner_cpu: 0\n| CPU: 0 UID: 0 PID: 95 Comm: cansend Not tainted 6.15.0-rc3-00032-ga79be02bba5c #5 NONE\n| Hardware name: MachineWare SIM-V (DT)\n| Call Trace:\n| [] dump_backtrace+0x1c/0x24\n| [] show_stack+0x28/0x34\n| [] dump_stack_lvl+0x4a/0x68\n| [] dump_stack+0x14/0x1c\n| [] spin_dump+0x62/0x6e\n| [] do_raw_spin_lock+0xd0/0x142\n| [] _raw_spin_lock_irqsave+0x20/0x2c\n| [] m_can_start_xmit+0x90/0x34a\n| [] dev_hard_start_xmit+0xa6/0xee\n| [] sch_direct_xmit+0x114/0x292\n| [] __dev_queue_xmit+0x3b0/0xaa8\n| [] can_send+0xc6/0x242\n| [] raw_sendmsg+0x1a8/0x36c\n| [] sock_write_iter+0x9a/0xee\n| [] vfs_write+0x184/0x3a6\n| [] ksys_write+0xa0/0xc0\n| [] __riscv_sys_write+0x14/0x1c\n| [] do_trap_ecall_u+0x168/0x212\n| [] handle_exception+0x146/0x152\n\nInitializing the spin lock in m_can_class_allocate_dev solves that\nproblem." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-33043", + "ASSIGNER" : "biossecurity@ami.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025005.pdf", + "name" : "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025005.pdf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "APTIOV contains a vulnerability in BIOS where an attacker may cause an Improper Input Validation locally. Successful exploitation of this vulnerability can potentially impact of integrity." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T14:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48047", + "ASSIGNER" : "cve@rapid7.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.rapid7.com/blog/post/2025/05/29/cve-2025-48045-cve-2025-48046-cve-2025-48047-mici-netfax-server-product-vulnerabilities-not-fixed/", + "name" : "https://www.rapid7.com/blog/post/2025/05/29/cve-2025-48045-cve-2025-48046-cve-2025-48047-mici-netfax-server-product-vulnerabilities-not-fixed/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An authenticated user can perform command injection via unsanitized input to the NetFax Server’s ping functionality via the /test.php endpoint." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T13:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48046", + "ASSIGNER" : "cve@rapid7.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.rapid7.com/blog/post/2025/05/29/cve-2025-48045-cve-2025-48046-cve-2025-48047-mici-netfax-server-product-vulnerabilities-not-fixed/", + "name" : "https://www.rapid7.com/blog/post/2025/05/29/cve-2025-48045-cve-2025-48046-cve-2025-48047-mici-netfax-server-product-vulnerabilities-not-fixed/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An authenticated user can disclose the cleartext password of a configured SMTP server via an HTTP GET request to the /config.php endpoint." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T13:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48045", + "ASSIGNER" : "cve@rapid7.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.rapid7.com/blog/post/2025/05/29/cve-2025-48045-cve-2025-48046-cve-2025-48047-mici-netfax-server-product-vulnerabilities-not-fixed/", + "name" : "https://www.rapid7.com/blog/post/2025/05/29/cve-2025-48045-cve-2025-48046-cve-2025-48047-mici-netfax-server-product-vulnerabilities-not-fixed/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An unauthenticated HTTP GET request to the /client.php endpoint will disclose the default administrator user credentials." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T13:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48388", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-134" + }, { + "lang" : "en", + "value" : "CWE-93" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/freescout-help-desk/freescout/commit/eab97711027fff4bce90ccd2e189cbc184fa0370", + "name" : "https://github.com/freescout-help-desk/freescout/commit/eab97711027fff4bce90ccd2e189cbc184fa0370", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-c76f-wggm-grcq", + "name" : "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-c76f-wggm-grcq", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, the application performs insufficient validation of user-supplied data, which is used as arguments to string formatting functions. As a result, an attacker can pass a string containing special symbols (\\r, \\n, \\t)to the application. This issue has been patched in version 1.8.178." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T10:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5286", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L156", + "name" : "https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L156", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L176", + "name" : "https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L176", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L7", + "name" : "https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.6/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L7", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.7/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L156", + "name" : "https://plugins.trac.wordpress.org/browser/bold-page-builder/tags/5.3.7/content_elements/bt_bb_content_slider/bt_bb_content_slider.php#L156", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3302452", + "name" : "https://plugins.trac.wordpress.org/changeset/3302452", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/bold-page-builder/#developers", + "name" : "https://wordpress.org/plugins/bold-page-builder/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae076e4-ad15-4069-be10-f0f4aced4132?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae076e4-ad15-4069-be10-f0f4aced4132?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘additional_settings’ parameter in all versions up to, and including, 5.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-29T09:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5122", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/map-block-leaflet/trunk/build/leaflet-map-block/render.php#L41", + "name" : "https://plugins.trac.wordpress.org/browser/map-block-leaflet/trunk/build/leaflet-map-block/render.php#L41", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3302407/", + "name" : "https://plugins.trac.wordpress.org/changeset/3302407/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/map-block-leaflet/#developers", + "name" : "https://wordpress.org/plugins/map-block-leaflet/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/372f1cf3-df33-444c-b31e-8f71d128e30b?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/372f1cf3-df33-444c-b31e-8f71d128e30b?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Map Block Leaflet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-29T09:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4687", + "ASSIGNER" : "cert@teltonika.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jowin922.medium.com/cve-2025-4687-pre-account-takeover-through-invite-on-teletonika-rms-website-972335378829", + "name" : "https://jowin922.medium.com/cve-2025-4687-pre-account-takeover-through-invite-on-teletonika-rms-website-972335378829", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In Teltonika Networks Remote Management System (RMS), it is possible to perform account pre-hijacking by misusing the invite functionality. If a victim has a pending invite and registers to the platform directly, they are added to the attackers company without their knowledge. The victims account and their company can then be managed by the attacker.This issue affects RMS: before 5.7." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T09:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4670", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/changeset/3301852/", + "name" : "https://plugins.trac.wordpress.org/changeset/3301852/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/easy-digital-downloads/#developers", + "name" : "https://wordpress.org/plugins/easy-digital-downloads/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/95c5bfc5-53b3-482f-856b-db6b6cac93a2?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/95c5bfc5-53b3-482f-856b-db6b6cac93a2?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Easy Digital Downloads – eCommerce Payments and Subscriptions made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's edd_receipt shortcode in all versions up to, and including, 3.3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-29T09:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27151", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-20" + }, { + "lang" : "en", + "value" : "CWE-121" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/redis/redis/commit/643b5db235cb82508e72f11c7b4bbfc7dc39be56", + "name" : "https://github.com/redis/redis/commit/643b5db235cb82508e72f11c7b4bbfc7dc39be56", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/redis/redis/releases/tag/8.0.2", + "name" : "https://github.com/redis/redis/releases/tag/8.0.2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/redis/redis/security/advisories/GHSA-5453-q98w-cmvm", + "name" : "https://github.com/redis/redis/security/advisories/GHSA-5453-q98w-cmvm", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T09:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-52588", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-918" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf", + "name" : "https://github.com/strapi/strapi/security/advisories/GHSA-v8wj-f5c7-pvxf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Strapi is an open-source content management system. Prior to version 4.25.2, inputting a local domain into the Webhooks URL field leads to the application fetching itself, resulting in a server side request forgery (SSRF). This issue has been patched in version 4.25.2." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T09:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5276", + "ASSIGNER" : "report@snyk.io" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/zcaceres/markdownify-mcp/blob/224cf89f0d58616d2a5522f60f184e8391d1c9e3/src/server.ts%23L20C17-L20C29", + "name" : "https://github.com/zcaceres/markdownify-mcp/blob/224cf89f0d58616d2a5522f60f184e8391d1c9e3/src/server.ts%23L20C17-L20C29", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/zcaceres/markdownify-mcp/commit/0284aa8f34d32c65e20d8cda2d429b7943c9af03", + "name" : "https://github.com/zcaceres/markdownify-mcp/commit/0284aa8f34d32c65e20d8cda2d429b7943c9af03", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249387", + "name" : "https://security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249387", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249387", + "name" : "https://security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249387", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "All versions of the package mcp-markdownify-server are vulnerable to Server-Side Request Forgery (SSRF) via the Markdownify.get() function. An attacker can craft a prompt that, once accessed by the MCP host, can invoke the webpage-to-markdown, bing-search-to-markdown, and youtube-to-markdown tools to issue requests and read the responses to attacker-controlled URLs, potentially leaking sensitive information." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T05:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5273", + "ASSIGNER" : "report@snyk.io" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/zcaceres/markdownify-mcp/blob/3667bd4765c0e49684ce22df268d02dd478a7f3b/src/Markdownify.ts%23L94", + "name" : "https://github.com/zcaceres/markdownify-mcp/blob/3667bd4765c0e49684ce22df268d02dd478a7f3b/src/Markdownify.ts%23L94", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/zcaceres/markdownify-mcp/commit/3a6b202d088ef7acb8be84bc09515f41a2b1a9df", + "name" : "https://github.com/zcaceres/markdownify-mcp/commit/3a6b202d088ef7acb8be84bc09515f41a2b1a9df", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249193", + "name" : "https://security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249193", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249193", + "name" : "https://security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249193", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "All versions of the package mcp-markdownify-server are vulnerable to Files or Directories Accessible to External Parties via the get-markdown-file tool. An attacker can craft a prompt that, once accessed by the MCP host, will allow it to read arbitrary files from the host running the server." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T05:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4583", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/instagram-feed/tags/6.9.0/js/sb-instagram-admin-6.js#L428", + "name" : "https://plugins.trac.wordpress.org/browser/instagram-feed/tags/6.9.0/js/sb-instagram-admin-6.js#L428", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/23e47daa-79e7-4ed3-a88a-0f090e9aa277?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/23e47daa-79e7-4ed3-a88a-0f090e9aa277?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Smash Balloon Social Photo Feed – Easy Social Feeds Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `data-plugin` attribute in all versions up to, and including, 6.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 5.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.3, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-29T05:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3755", + "ASSIGNER" : "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1285" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jvn.jp/vu/JVNVU94070048/", + "name" : "https://jvn.jp/vu/JVNVU94070048/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-003_en.pdf", + "name" : "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-003_en.pdf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to read information in the product, to cause a Denial-of-Service (DoS) condition in MELSOFT connection, or to stop the operation of the CPU module (causing a DoS condtion on the CPU module), by sending specially crafted packets. The product is needed to reset for recovery." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-29T05:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-51756", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T22:15Z", + "lastModifiedDate" : "2025-05-28T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-51753", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T22:15Z", + "lastModifiedDate" : "2025-05-28T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-50338", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T22:15Z", + "lastModifiedDate" : "2025-05-28T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-49904", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T22:15Z", + "lastModifiedDate" : "2025-05-28T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-49604", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T22:15Z", + "lastModifiedDate" : "2025-05-28T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-49139", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T22:15Z", + "lastModifiedDate" : "2025-05-28T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-49137", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T22:15Z", + "lastModifiedDate" : "2025-05-28T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-48726", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T22:15Z", + "lastModifiedDate" : "2025-05-28T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27706", + "ASSIGNER" : "SecurityResponse@netmotionsoftware.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27706", + "name" : "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27706", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "CVE-2025-27706 is a cross-site scripting vulnerability in the management\n console of Absolute Secure Access prior to version 13.54. Attackers \nwith system administrator permissions can interfere with another system \nadministrator’s use of the management console when the second \nadministrator visits the page. Attack complexity is low, there are no \npreexisting attack requirements, privileges required are high and active\n user interaction is required. There is no impact on confidentiality, \nthe impact on integrity is low and there is no impact on availability." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T21:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27703", + "ASSIGNER" : "SecurityResponse@netmotionsoftware.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27703", + "name" : "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27703", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "CVE-2025-27703 is a privilege escalation vulnerability in the management\n console of Absolute Secure Access prior to version 13.54. Attackers \nwith administrative access to a specific subset of privileged features \nin the console can elevate their permissions to access additional \nfeatures in the console. The attack complexity is low, there are no \npreexisting attack requirements; the privileges required are high, and \nthere is no user interaction required. The impact to system \nconfidentiality is low, the impact to system integrity is high and the \nimpact to system availability is low." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T21:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27702", + "ASSIGNER" : "SecurityResponse@netmotionsoftware.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27702", + "name" : "https://www.absolute.com/platform/vulnerability-archive/cve-2025-27702", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "CVE-2025-27702 is a vulnerability in the management console of Absolute \nSecure Access prior to version 13.54. Attackers with administrative \naccess to the console and who have been assigned a certain set of \npermissions can bypass those permissions to improperly modify settings. \nThe attack complexity is low, there are no preexisting attack \nrequirements; the privileges required are high, and there is no user \ninteraction required. There is no impact to system confidentiality or \navailability, impact to system integrity is high." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T21:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-47914", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-46739", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-46736", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-46735", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-46734", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-46729", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-46655", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-46419", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-46296", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-45878", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-45125", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-45120", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-45117", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-45114", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-44618", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-44614", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-44613", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-44609", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-44607", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-44454", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-44452", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-44450", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43669", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43661", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43659", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43511", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43510", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43498", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43446", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43444", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-42702", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-42700", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-42487", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-42480", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-41997", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-41834", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-41803", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-41782", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-41637", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-41626", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-41625", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-41341", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-40689", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-40688", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-40221", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-38084", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-38071", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-37408", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36792", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36426", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36421", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36420", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36419", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36395", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36393", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36366", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36353", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36342", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36297", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36294", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36291", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36290", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36286", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36283", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36281", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-35736", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-35732", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-35731", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-35727", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-35400", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-35274", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-35237", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34863", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34861", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34856", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34852", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34846", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34842", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34653", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34649", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34489", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33979", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33976", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33966", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33949", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33940", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33899", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33895", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33310", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33200", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33197", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33188", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33145", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33144", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33143", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33141", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-32762", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-32584", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-32581", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-32580", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-32571", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-32288", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-32232", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-30606", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-30537", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-29921", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-29920", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-29896", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-29895", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-29870", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-29478", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-29469", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-28698", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-28694", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-27173", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-26515", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-26084", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-24914", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-23917", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-23914", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21795", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21207", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21206", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21188", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21185", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21183", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21175", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21171", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21161", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21135", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5256", + "ASSIGNER" : "security@mautic.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mautic/mautic/security/advisories/GHSA-6vx9-9r2g-8373", + "name" : "https://github.com/mautic/mautic/security/advisories/GHSA-6vx9-9r2g-8373", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SummaryThis advisory addresses an Open Redirection vulnerability in Mautic's user unlocking endpoint. This vulnerability could be exploited by an attacker to redirect legitimate users to malicious websites, potentially leading to phishing attacks or the delivery of exploit kits.\n\nOpen Redirection via returnUrl Parameter: An Open Redirection vulnerability exists in the /s/action/unlock/user.user/0 endpoint. The returnUrl parameter, intended for post-action redirection, is not properly validated. This allows an attacker to craft a URL that, when clicked by a user, redirects them to an arbitrary external website controlled by the attacker.\n\nMitigationUpdate Mautic to a version that properly validates or sanitizes the returnUrl parameter to ensure that redirects only occur to trusted, internal URLs or explicitly whitelisted domains." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48749", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", + "name" : "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://netwrix.com", + "name" : "https://netwrix.com", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Netwrix Directory Manager (formerly Imanami GroupID) v11.0.0.0 and before & after v.11.1.25134.03 inserts Sensitive Information into Sent Data." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48747", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", + "name" : "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://netwrix.com", + "name" : "https://netwrix.com", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Netwrix Directory Manager (formerly Imanami GroupID) before and including v.11.0.0.0 and after v.11.1.25134.03 has Incorrect Permission Assignment for a Critical Resource." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47748", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", + "name" : "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://netwrix.com", + "name" : "https://netwrix.com", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Netwrix Directory Manager v.11.0.0.0 and before & after v.11.1.25134.03 contains a hardcoded password." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-30T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-32803", + "ASSIGNER" : "security-officer@isc.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://kb.isc.org/docs/cve-2025-32803", + "name" : "CVE-2025-32803", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In some cases, Kea log files or lease files may be world-readable.\nThis issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.0, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.5, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31501", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.bestpractical.com/release-notes/rt/5.0.8", + "name" : "https://docs.bestpractical.com/release-notes/rt/5.0.8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://docs.bestpractical.com/release-notes/rt/index.html", + "name" : "https://docs.bestpractical.com/release-notes/rt/index.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Best Practical RT (Request Tracker) 5.0 through 5.0.7 allows XSS via JavaScript injection in an RT permalink." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-31500", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.bestpractical.com/release-notes/rt/5.0.8", + "name" : "https://docs.bestpractical.com/release-notes/rt/5.0.8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://docs.bestpractical.com/release-notes/rt/index.html", + "name" : "https://docs.bestpractical.com/release-notes/rt/index.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Best Practical RT (Request Tracker) 5.0 through 5.0.7 allows XSS via JavaScript injection in an Asset name." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-30087", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.bestpractical.com/release-notes/rt/4.4.8", + "name" : "https://docs.bestpractical.com/release-notes/rt/4.4.8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://docs.bestpractical.com/release-notes/rt/5.0.8", + "name" : "https://docs.bestpractical.com/release-notes/rt/5.0.8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://docs.bestpractical.com/release-notes/rt/index.html", + "name" : "https://docs.bestpractical.com/release-notes/rt/index.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Best Practical RT (Request Tracker) 4.4 through 4.4.7 and 5.0 through 5.0.7 allows XSS via injection of crafted parameters in a search URL." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1461", + "ASSIGNER" : "disclosures@herodevs.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461", + "name" : "https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.herodevs.com/vulnerability-directory/cve-2025-1461", + "name" : "https://www.herodevs.com/vulnerability-directory/cve-2025-1461", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation.\n\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ ." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-57338", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.m2soft.co.kr/sub/board/news.asp?mode=view&idx=2411", + "name" : "https://www.m2soft.co.kr/sub/board/news.asp?mode=view&idx=2411", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An arbitrary file upload vulnerability in M2Soft CROWNIX Report & ERS v5.x to v5.5.14.1070, v7.x to v7.4.3.960, and v8.x to v8.2.0.345 allows attackers to execute arbitrary code via supplying a crafted file." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-30T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-57337", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.m2soft.co.kr/sub/board/news.asp?mode=view&idx=2411", + "name" : "https://www.m2soft.co.kr/sub/board/news.asp?mode=view&idx=2411", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An arbitrary file upload vulnerability in the opcode 500 functionality of M2Soft CROWNIX Report & ERS v5.x to v5.5.14.1070, v7.x to v7.4.3.960, and v8.x to v8.2.0.345 allows attackers to execute arbitrary code via supplying a crafted file." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-30T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-57336", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.m2soft.co.kr/sub/board/news.asp?mode=view&idx=2411", + "name" : "https://www.m2soft.co.kr/sub/board/news.asp?mode=view&idx=2411", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Incorrect access control in M2Soft CROWNIX Report & ERS affected v7.x to v7.4.3.599 and v8.x to v8.0.3.79 allows unauthorized attackers to obtain Administrator account access." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-30T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-47057", + "ASSIGNER" : "security@mautic.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mautic/mautic/security/advisories/GHSA-424x-cxvh-wq9p", + "name" : "https://github.com/mautic/mautic/security/advisories/GHSA-424x-cxvh-wq9p", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SummaryThis advisory addresses a security vulnerability in Mautic related to the \"Forget your password\" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames.\n\nUser Enumeration via Timing Attack: A user enumeration vulnerability exists in the \"Forget your password\" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a timing-based attack.\n\nMitigationPlease update to a version that addresses this timing vulnerability, where password reset responses are normalized to respond at the same time regardless of user existence." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-47055", + "ASSIGNER" : "security@mautic.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mautic/mautic/security/advisories/GHSA-vph5-ghq3-q782", + "name" : "https://github.com/mautic/mautic/security/advisories/GHSA-vph5-ghq3-q782", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks.\n\nInsecure Direct Object Reference (IDOR) / Missing Authorization: A missing authorization vulnerability exists in the cloneAction of the segment management. This allows an authenticated user to bypass intended permission restrictions and clone segments even if they lack the necessary permissions to create new ones.\n\nMitigationUpdate Mautic to a version that implements proper authorization checks for the cloneAction within the ListController.php. Ensure that users attempting to clone segments possess the appropriate creation permissions." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43502", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43496", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-43493", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-40970", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-38092", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36406", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-36298", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34860", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-34859", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-33893", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-32233", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-29924", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-27877", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-27876", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-26038", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T18:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5257", + "ASSIGNER" : "security@mautic.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mautic/mautic/security/advisories/GHSA-cqx4-9vqf-q3m8", + "name" : "https://github.com/mautic/mautic/security/advisories/GHSA-cqx4-9vqf-q3m8", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SummaryThis advisory addresses a security vulnerability in Mautic where unpublished page previews could be accessed by unauthenticated users and potentially indexed by search engines. This could lead to the unintended disclosure of draft content or sensitive information.\n\nUnauthorized Access to Unpublished Page Previews: The page preview functionality for unpublished content, accessible via predictable URLs (e.g., /page/preview/1, /page/preview/2), lacked proper authorization checks. This allowed any unauthenticated user to view content that was not yet intended for public release, and allowed search engines to index these private preview URLs, making the content publicly discoverable.\nMitigationMautic has patched this vulnerability by enforcing proper permission checks on preview pages. Users should upgrade to the patched version of Mautic or later." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48931", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-328" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "name" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48930", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-316" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "name" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues, as exploited in the wild in May 2025." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48929", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-922" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "name" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered by an adversary, as exploited in the wild in May 2025." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48928", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-528" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "name" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a \"core dump\" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48927", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1188" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "name" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48926", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-288" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "name" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers, as exploited in the wild in May 2025." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48925", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-836" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "name" : "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The TeleMessage service through 2025-05-05 relies on the client side (e.g., the TM SGNL app) to do MD5 hashing, and then accepts the hash as the authentication credential, as exploited in the wild in May 2025." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48746", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", + "name" : "https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://netwrix.com", + "name" : "https://netwrix.com", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Netwrix Directory Manager (formerly Imanami GroupID) v.11.0.0.0 and before, as well as after v.11.1.25134.03 lacks Authentication for a Critical Function." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-30T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-36572", + "ASSIGNER" : "secure@dell.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-798" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.dell.com/support/kbdoc/en-us/000325205/dsa-2025-223-dell-powerstore-t-security-update-for-multiple-vulnerabilities", + "name" : "https://www.dell.com/support/kbdoc/en-us/000325205/dsa-2025-223-dell-powerstore-t-security-update-for-multiple-vulnerabilities", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Dell PowerStore, version(s) 4.0.0.0, contain(s) an Use of Hard-coded Credentials vulnerability in the PowerStore image file. A low privileged attacker with remote access, with the knowledge of the hard-coded credentials, could potentially exploit this vulnerability to gain unauthorized access based on the hardcoded account's privileges." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-32802", + "ASSIGNER" : "security-officer@isc.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://kb.isc.org/docs/cve-2025-32802", + "name" : "CVE-2025-32802", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.\nThis issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "HIGH", + "baseScore" : 6.1, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 4.2 + } + }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-32801", + "ASSIGNER" : "security-officer@isc.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://kb.isc.org/docs/cve-2025-32801", + "name" : "CVE-2025-32801", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths.\nThis issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-47056", + "ASSIGNER" : "security@mautic.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/mautic/mautic/security/advisories/GHSA-h2wg-v8wg-jhxh", + "name" : "https://github.com/mautic/mautic/security/advisories/GHSA-h2wg-v8wg-jhxh", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations.\n\nSensitive Information Disclosure via .env File Exposure: The .env file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL.\n\nMitigationUpdate Mautic to the latest Mautic version.\n\nBy default, Mautic does not use .env files for production data.\n\nFor Apache users: Ensure your web server is configured to respect .htaccess files.\n\nFor Nginx users: As Nginx does not inherently support .htaccess files, you must manually add a configuration block to your Nginx server configuration to deny access to .env files. Add the following to your Nginx configuration for the Mautic site:\n\nlocation ~ /\\.env {\n deny all;\n}\n\n\n\n\n\nAfter modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-26424", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-26304", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-26072", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-26056", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-26037", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-25909", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-25870", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-25868", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-24067", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T17:15Z", + "lastModifiedDate" : "2025-05-28T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-45343", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://w18e.com", + "name" : "http://w18e.com", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gist.github.com/isstabber/b363d47966965e5c0a8ec26d445e090b", + "name" : "https://gist.github.com/isstabber/b363d47966965e5c0a8ec26d445e090b", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gist.github.com/isstabber/b363d47966965e5c0a8ec26d445e090b", + "name" : "https://gist.github.com/isstabber/b363d47966965e5c0a8ec26d445e090b", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.tenda.com.cn/", + "name" : "https://www.tenda.com.cn/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue in Tenda W18E v.2.0 v.16.01.0.11 allows an attacker to execute arbitrary code via the editing functionality of the account module in the goform/setmodules route." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T16:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-51453", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7234887", + "name" : "https://www.ibm.com/support/pages/node/7234887", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Sterling Secure Proxy 6.2.0.0 through 6.2.0.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-28T16:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-38341", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-328" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7234888", + "name" : "https://www.ibm.com/support/pages/node/7234888", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Sterling Secure Proxy 6.0.0.0 through 6.0.3.1, 6.1.0.0 through 6.1.0.0, and 6.2.0.0 through 6.2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "HIGH", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 5.9, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.2, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-28T16:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3357", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1285" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7234923", + "name" : "https://www.ibm.com/support/pages/node/7234923", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 could allow a remote attacker to execute arbitrary code due to improper validation of an index value of a dynamically allocated array." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-28T15:15Z", + "lastModifiedDate" : "2025-05-29T14:29Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5277", + "ASSIGNER" : "report@snyk.io" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/alexei-led/aws-mcp-server/blob/94d20ae1798a43ac7e3a28e71900d774e5159c8a/src/aws_mcp_server/cli_executor.py#L92", + "name" : "https://github.com/alexei-led/aws-mcp-server/blob/94d20ae1798a43ac7e3a28e71900d774e5159c8a/src/aws_mcp_server/cli_executor.py#L92", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/alexei-led/aws-mcp-server/commit/94d20ae1798a43ac7e3a28e71900d774e5159c8a", + "name" : "https://github.com/alexei-led/aws-mcp-server/commit/94d20ae1798a43ac7e3a28e71900d774e5159c8a", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "aws-mcp-server MCP server is vulnerable to command injection. An attacker can craft a prompt that once accessed by the MCP client will run arbitrary commands on the host system." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T14:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4134", + "ASSIGNER" : "security@nortonlifelock.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.gendigital.com/us/en/contact-us/security-advisories/", + "name" : "https://www.gendigital.com/us/en/contact-us/security-advisories/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Lack of file validation in do_update_vps in Avast Business Antivirus for Linux 4.5 on Linux allows local user to spoof or tamper with the update file via an unverified file write." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T14:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48734", + "ASSIGNER" : "security@apache.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/28/6", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/28/6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9", + "name" : "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper Access Control vulnerability in Apache Commons.\n\n\n\nA special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default.\n\n\n\n\n\nReleases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum’s class loader via the “declaredClass” property available on all Java “enum” objects. Accessing the enum’s “declaredClass” allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty().\nStarting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the “declaredClass” property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user's guide and the unit tests.\n\nThis issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils\n\n 1.x are recommended to upgrade to version 1.11.0, which fixes the issue.\n\n\nUsers of the artifact org.apache.commons:commons-beanutils2\n\n 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T14:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-45997", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/litsasuk/CVE-POC/blob/main/CVE-2025-45997.md", + "name" : "https://github.com/litsasuk/CVE-POC/blob/main/CVE-2025-45997.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sourcecodester.com/php/17883/web-based-product-alert-system.html", + "name" : "https://www.sourcecodester.com/php/17883/web-based-product-alert-system.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Sourcecodester Web-based Pharmacy Product Management System v.1.0 has a file upload vulnerability. An attacker can upload a PHP file disguised as an image by modifying the Content-Type header to image/jpg." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T14:15Z", + "lastModifiedDate" : "2025-05-28T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40651", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/reflected-cross-site-scripting-xss-real-easy-store", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/reflected-cross-site-scripting-xss-real-easy-store", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Reflected Cross-Site Scripting (XSS) vulnerability in Real Easy Store. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the keyword parameter in /index.php?a=search. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T14:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4493", + "ASSIGNER" : "security@devolutions.net" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://devolutions.net/security/advisories/DEVO-2025-0008/", + "name" : "https://devolutions.net/security/advisories/DEVO-2025-0008/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper privilege assignment in PAM JIT privilege sets in Devolutions \nServer allows a PAM user to perform PAM JIT \nrequests on unauthorized groups by exploiting a user interface issue.\n\n\nThis issue affects the following versions : \n\n * Devolutions Server 2025.1.3.0 through 2025.1.7.0\n * Devolutions Server 2024.3.15.0 and earlier" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T13:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5299", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-434" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/RS7325/cve/issues/3", + "name" : "https://github.com/RS7325/cve/issues/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310426", + "name" : "VDB-310426 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310426", + "name" : "VDB-310426 | SourceCodester Client Database Management System user_order_customer_update.php unrestricted upload", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.585732", + "name" : "Submit #585732 | SourceCodester Client Database Management System v1.0 File Upload", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sourcecodester.com/", + "name" : "https://www.sourcecodester.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in SourceCodester Client Database Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /user_order_customer_update.php. The manipulation of the argument uploaded_file_cancelled leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-28T12:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5298", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/RS7325/cve/issues/2", + "name" : "https://github.com/RS7325/cve/issues/2", + "refsource" : "", + "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ] + }, { + "url" : "https://vuldb.com/?ctiid.310422", + "name" : "VDB-310422 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ "Permissions Required", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?id.310422", + "name" : "VDB-310422 | Campcodes Online Hospital Management System betweendates-detailsreports.php sql injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?submit.585161", + "name" : "Submit #585161 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ "Product" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in Campcodes Online Hospital Management System 1.0. Affected is an unknown function of the file /admin/betweendates-detailsreports.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-28T12:15Z", + "lastModifiedDate" : "2025-05-28T20:37Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5297", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-121" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/byxs0x0/cve/issues/6", + "name" : "https://github.com/byxs0x0/cve/issues/6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310421", + "name" : "VDB-310421 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310421", + "name" : "VDB-310421 | SourceCodester Computer Store System main.c Add stack-based overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.585114", + "name" : "Submit #585114 | SourceCodester Simple Computer Store System v1.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sourcecodester.com/", + "name" : "https://www.sourcecodester.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in SourceCodester Computer Store System 1.0. This issue affects the function Add of the file main.c. The manipulation of the argument laptopcompany/RAM/Processor leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-28T12:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3864", + "ASSIGNER" : "cvd@cert.pl" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-772" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-3864/", + "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-3864/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/benoitc/hackney/issues/717", + "name" : "https://github.com/benoitc/hackney/issues/717", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library.\nFix for this issue has been included in 1.24.0 release." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T12:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5295", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fitoxs.com/exploit/exploit-4f6236b59b5119d64718e994b0f3d63a755e7cb5a496e3846b92dfb960f1a80a.txt", + "name" : "https://fitoxs.com/exploit/exploit-4f6236b59b5119d64718e994b0f3d63a755e7cb5a496e3846b92dfb960f1a80a.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310420", + "name" : "VDB-310420 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310420", + "name" : "VDB-310420 | FreeFloat FTP Server PORT Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582988", + "name" : "Submit #582988 | FreeFloat FTP Server 1.0.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in FreeFloat FTP Server 1.0.0. This vulnerability affects unknown code of the component PORT Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-28T11:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40673", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/missing-authorization-dinorank", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/missing-authorization-dinorank", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Missing Authorization vulnerability has been found in DinoRANK. This \nvulnerability allows an attacker to access invoices of any user via \naccessing endpoint '/facturas/YYYY-MM/SDRYYMM-XXXXX.pdf' because there \nis no access control. The pdf filename can be obtained via OSINT, \ninsecure network traffic or brute force." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T11:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4963", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/changeset/3300818/", + "name" : "https://plugins.trac.wordpress.org/changeset/3300818/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/wpextended/#developers", + "name" : "https://wordpress.org/plugins/wpextended/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wpextended.io/module_resources/svg-file-upload/", + "name" : "https://wpextended.io/module_resources/svg-file-upload/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/eabdd744-1a72-40f2-b569-f56a1b913273?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/eabdd744-1a72-40f2-b569-f56a1b913273?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The WP Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-28T10:15Z", + "lastModifiedDate" : "2025-05-28T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1753", + "ASSIGNER" : "security@huntr.dev" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-78" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/run-llama/llama_index/commit/b57e76738c53ca82d88658b82f2d82d1c7839c7d", + "name" : "https://github.com/run-llama/llama_index/commit/b57e76738c53ca82d88658b82f2d82d1c7839c7d", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://huntr.com/bounties/19e1c67e-1d77-451d-b10b-acbe99900b22", + "name" : "https://huntr.com/bounties/19e1c67e-1d77-451d-b10b-acbe99900b22", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "LLama-Index CLI version v0.12.20 contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the `--files` argument, which is directly passed into `os.system`. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T10:15Z", + "lastModifiedDate" : "2025-05-28T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5287", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/inprosysmedia-likes-dislikes-post/trunk/inprosysmedia-likes-dislikes-post.php#L76", + "name" : "https://plugins.trac.wordpress.org/browser/inprosysmedia-likes-dislikes-post/trunk/inprosysmedia-likes-dislikes-post.php#L76", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad19205d-d355-45d8-be5b-f8005459a8c7?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad19205d-d355-45d8-be5b-f8005459a8c7?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 7.5, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-28T09:15Z", + "lastModifiedDate" : "2025-05-28T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5082", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/html/attachmentEditIframe.php", + "name" : "https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/html/attachmentEditIframe.php", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/ij-post-attachments.php#L274", + "name" : "https://plugins.trac.wordpress.org/browser/wp-attachments/tags/5.0.12/inc/ij-post-attachments.php#L274", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3300269/", + "name" : "https://plugins.trac.wordpress.org/changeset/3300269/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/wp-attachments/#developers", + "name" : "https://wordpress.org/plugins/wp-attachments/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc33ecc-da54-4852-8426-bfafe0dca41b?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc33ecc-da54-4852-8426-bfafe0dca41b?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The WP Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘attachment_id’ parameter in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.1, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47295", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-126" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-381", + "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-381", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A buffer over-read in Fortinet FortiOS versions 7.4.0 through 7.4.3, versions 7.2.0 through 7.2.7, and versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the FGFM daemon via a specially crafted request, under rare conditions that are outside of the attacker's control." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-47294", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-190" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-388", + "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-388", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46777", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-532" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-380", + "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-380", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A insertion of sensitive information into log file in Fortinet FortiPortal versions 7.4.0, versions 7.2.0 through 7.2.5, and versions 7.0.0 through 7.0.9 may allow an authenticated attacker with at least read-only admin permissions to view encrypted secrets via the FortiPortal System Log." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27528", + "ASSIGNER" : "security@apache.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/28/3", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/28/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/apache/inlong/pull/11747", + "name" : "https://github.com/apache/inlong/pull/11747", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://lists.apache.org/thread/b807rqzgyv4qgvxw3nhkq8tl6g90gqgj", + "name" : "https://lists.apache.org/thread/b807rqzgyv4qgvxw3nhkq8tl6g90gqgj", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Deserialization of Untrusted Data vulnerability in Apache InLong.\n\nThis issue affects Apache InLong: from 1.13.0 through 2.1.0. \n\nThis\nvulnerability allows attackers to bypass the security mechanisms of InLong\nJDBC and leads to arbitrary file reading. Users are advised to upgrade to Apache InLong's 2.2.0 or cherry-pick [1] to solve it.\n\n[1] https://github.com/apache/inlong/pull/11747" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27526", + "ASSIGNER" : "security@apache.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/28/1", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/28/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/apache/inlong/pull/11747", + "name" : "https://github.com/apache/inlong/pull/11747", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://lists.apache.org/thread/4t4sqscm7xdqn883dyjy40qk6ncf26xf", + "name" : "https://lists.apache.org/thread/4t4sqscm7xdqn883dyjy40qk6ncf26xf", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Deserialization of Untrusted Data vulnerability in Apache InLong.\n\nThis issue affects Apache InLong: from 1.13.0 through 2.1.0. This vulnerability which can lead to JDBC Vulnerability URLEncdoe and backspace bypass. Users are advised to upgrade to Apache InLong's 2.2.0 or cherry-pick [1] to solve it.\n\n[1]  https://github.com/apache/inlong/pull/11747" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27522", + "ASSIGNER" : "security@apache.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/apache/inlong/pull/11732", + "name" : "https://github.com/apache/inlong/pull/11732", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://lists.apache.org/thread/s4dnmq3gwcjocxf85qk190knlzd26jby", + "name" : "https://lists.apache.org/thread/s4dnmq3gwcjocxf85qk190knlzd26jby", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Deserialization of Untrusted Data vulnerability in Apache InLong.\n\nThis issue affects Apache InLong: from 1.13.0 through 2.1.0. This vulnerability is a secondary mining bypass for CVE-2024-26579. Users are advised to upgrade to Apache InLong's 2.2.0 or cherry-pick [1] to solve it.\n\n[1] \n\n https://github.com/apache/inlong/pull/11732" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-25251", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-016", + "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-016", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An Incorrect Authorization vulnerability [CWE-863] in FortiClient Mac 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 may allow a local attacker to escalate privileges via crafted XPC messages." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-24473", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-497" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-548", + "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-548", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A exposure of sensitive system information to an unauthorized control sphere in Fortinet FortiClientWindows versions 7.2.0 through 7.2.1 may allow an unauthorized remote attacker to view application information via navigation to a hosted webpage, if Windows is configured to accept incoming connections to port 8053 (non-default setup)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-22252", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-306" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-472", + "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-472", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-54020", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-023", + "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-023", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A missing authorization in Fortinet FortiManager versions 7.2.0 through 7.2.1, and versions 7.0.0 through 7.0.7 may allow an authenticated attacker to overwrite global threat feeds via crafted update requests." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T08:15Z", + "lastModifiedDate" : "2025-05-28T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5025", + "ASSIGNER" : "cve@curl.se" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/28/5", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/28/5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://curl.se/docs/CVE-2025-5025.html", + "name" : "www", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://curl.se/docs/CVE-2025-5025.json", + "name" : "json", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://hackerone.com/reports/3153497", + "name" : "issue", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T07:15Z", + "lastModifiedDate" : "2025-05-30T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4947", + "ASSIGNER" : "cve@curl.se" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/28/4", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/28/4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://curl.se/docs/CVE-2025-4947.html", + "name" : "www", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://curl.se/docs/CVE-2025-4947.json", + "name" : "json", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://hackerone.com/reports/3150884", + "name" : "issue", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T07:15Z", + "lastModifiedDate" : "2025-05-28T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4009", + "ASSIGNER" : "research@onekey.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009", + "name" : "https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product\nfeatures, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz.\n\nThis web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.\n\nRemote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.\n\nThis level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T07:15Z", + "lastModifiedDate" : "2025-05-28T12:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4800", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-434" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://docs.stylemixthemes.com/masterstudy-lms/changelog-pro-version", + "name" : "https://docs.stylemixthemes.com/masterstudy-lms/changelog-pro-version", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://stylemixthemes.com/wordpress-lms-plugin/", + "name" : "https://stylemixthemes.com/wordpress-lms-plugin/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://themeforest.net/item/masterstudy-education-center-wordpress-theme/12170274/", + "name" : "https://themeforest.net/item/masterstudy-education-center-wordpress-theme/12170274/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c170a228-4abd-4ee6-ba37-bdcde1cb7fc5?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c170a228-4abd-4ee6-ba37-bdcde1cb7fc5?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-28T06:15Z", + "lastModifiedDate" : "2025-05-28T06:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48848", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48847", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48846", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48845", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48844", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48843", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48842", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48841", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2023-41839", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-28T04:15Z", + "lastModifiedDate" : "2025-05-28T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-25029", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-116" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7234827", + "name" : "https://www.ibm.com/support/pages/node/7234827", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Security Guardium 12.0 could allow a privileged user to download any file on the system due to improper escaping of input." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.9, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.2, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-28T02:15Z", + "lastModifiedDate" : "2025-05-28T02:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-25026", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-863" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7234827", + "name" : "https://www.ibm.com/support/pages/node/7234827", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Security Guardium 12.0 could allow an authenticated user to obtain sensitive information due to an incorrect authentication check." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-28T02:15Z", + "lastModifiedDate" : "2025-05-28T02:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-25025", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-209" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7234827", + "name" : "https://www.ibm.com/support/pages/node/7234827", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Security Guardium 12.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-28T02:15Z", + "lastModifiedDate" : "2025-05-28T02:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2826", + "ASSIGNER" : "psirt@arista.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21414-security-advisory-0120", + "name" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21414-security-advisory-0120", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "n affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ingress ACL, or IPv6 standard ingress ACL enabled on one or more ethernet or LAG interfaces may result in ACL policies not being enforced for ingress packets. This can cause incoming packets to incorrectly be allowed or denied. The two symptoms of this issue on the affected release and platform are:\n\n * Packets which should be permitted may be dropped and,\n * Packets which should be dropped may be permitted." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T23:15Z", + "lastModifiedDate" : "2025-05-27T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2796", + "ASSIGNER" : "psirt@arista.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21413-security-advisory-0119", + "name" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21413-security-advisory-0119", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal anti-replay protection, will instead be forwarded due to this vulnerability.\n\nNote: this issue does not affect VXLANSec or MACSec encryption functionality." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T23:15Z", + "lastModifiedDate" : "2025-05-27T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-45094", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7234276", + "name" : "https://www.ibm.com/support/pages/node/7234276", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM DS8900F and DS8A00 Hardware Management Console (HMC) is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 5.5, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.3, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-27T23:15Z", + "lastModifiedDate" : "2025-05-27T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-11185", + "ASSIGNER" : "psirt@arista.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://https://www.arista.com/en/support/advisories-notices/security-advisory/21411-security-advisory-0118", + "name" : "https://https://www.arista.com/en/support/advisories-notices/security-advisory/21411-security-advisory-0118", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain conditions, be improperly forwarded to ports associated with different VLANs, resulting in a breach of VLAN isolation and segmentation boundaries." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T23:15Z", + "lastModifiedDate" : "2025-05-27T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21200", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T23:15Z", + "lastModifiedDate" : "2025-05-27T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21150", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T23:15Z", + "lastModifiedDate" : "2025-05-27T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40911", + "ASSIGNER" : "cve-request@security.metacpan.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/", + "name" : "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/robrwo/perl-Net-CIDR-Set/commit/be7d91e8446ad8013b08b4be313d666dab003a8a.patch", + "name" : "https://github.com/robrwo/perl-Net-CIDR-Set/commit/be7d91e8446ad8013b08b4be313d666dab003a8a.patch", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://metacpan.org/release/RRWO/Net-CIDR-Set-0.14/changes", + "name" : "https://metacpan.org/release/RRWO/Net-CIDR-Set-0.14/changes", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses.\n\nLeading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation.\n\nNet::CIDR::Set used code from Net::CIDR::Lite, which had a similar vulnerability CVE-2021-47154." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T22:15Z", + "lastModifiedDate" : "2025-05-28T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-32440", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/jokob-sk/NetAlertX/releases/tag/v25.4.14", + "name" : "https://github.com/jokob-sk/NetAlertX/releases/tag/v25.4.14", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx", + "name" : "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx", + "name" : "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to bypass the authentication mechanism of NetAlertX to update settings without authentication. An attacker can trigger sensitive functions within util.php by sending crafted requests to /index.php. This issue has been patched in version 25.4.14." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T22:15Z", + "lastModifiedDate" : "2025-05-28T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5283", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "name" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "refsource" : "", + "tags" : [ "Release Notes" ] + }, { + "url" : "https://issues.chromium.org/issues/419467315", + "name" : "https://issues.chromium.org/issues/419467315", + "refsource" : "", + "tags" : [ "Permissions Required" ] + }, { + "url" : "https://lists.debian.org/debian-lts-announce/2025/05/msg00052.html", + "name" : "https://lists.debian.org/debian-lts-announce/2025/05/msg00052.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Use after free in libvpx in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "137.0.7151.55", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-31T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5281", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "name" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "refsource" : "", + "tags" : [ "Release Notes" ] + }, { + "url" : "https://issues.chromium.org/issues/417215501", + "name" : "https://issues.chromium.org/issues/417215501", + "refsource" : "", + "tags" : [ "Permissions Required" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Inappropriate implementation in BFCache in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially obtain user information via a crafted HTML page. (Chromium security severity: Medium)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "137.0.7151.55", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-29T15:50Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5280", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-787" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "name" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "refsource" : "", + "tags" : [ "Release Notes" ] + }, { + "url" : "https://issues.chromium.org/issues/417169470", + "name" : "https://issues.chromium.org/issues/417169470", + "refsource" : "", + "tags" : [ "Permissions Required" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Out of bounds write in V8 in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "137.0.7151.55", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-29T15:50Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5279", + "ASSIGNER" : "aws-security@amazon.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://aws.amazon.com/security/security-bulletins/", + "name" : "https://aws.amazon.com/security/security-bulletins/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "When the Amazon Redshift Python Connector is configured with the BrowserAzureOAuth2CredentialsProvider plugin, the driver skips the SSL certificate validation step for the Identity Provider. An insecure connection could allow an actor to intercept the token exchange process and retrieve an access token.\n\nThis issue has been addressed in driver version 2.1.7. Users should upgrade to address this issue and ensure any forked or derivative code is patched to incorporate the new fixes." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-27T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5278", + "ASSIGNER" : "secalert@redhat.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/27/2", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/27/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/29/1", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/29/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/29/2", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/29/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://access.redhat.com/security/cve/CVE-2025-5278", + "name" : "https://access.redhat.com/security/cve/CVE-2025-5278", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2368764", + "name" : "RHBZ#2368764", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633", + "name" : "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14", + "name" : "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://security-tracker.debian.org/tracker/CVE-2025-5278", + "name" : "https://security-tracker.debian.org/tracker/CVE-2025-5278", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-29T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5222", + "ASSIGNER" : "secalert@redhat.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://access.redhat.com/security/cve/CVE-2025-5222", + "name" : "https://access.redhat.com/security/cve/CVE-2025-5222", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2368600", + "name" : "RHBZ#2368600", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-28T15:01Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5198", + "ASSIGNER" : "secalert@redhat.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://access.redhat.com/security/cve/CVE-2025-5198", + "name" : "https://access.redhat.com/security/cve/CVE-2025-5198", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2368568", + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=2368568", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2368568", + "name" : "RHBZ#2368568", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-28T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5067", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "name" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "refsource" : "", + "tags" : [ "Release Notes" ] + }, { + "url" : "https://issues.chromium.org/issues/40075024", + "name" : "https://issues.chromium.org/issues/40075024", + "refsource" : "", + "tags" : [ "Permissions Required" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Inappropriate implementation in Tab Strip in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "137.0.7151.55", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-29T15:50Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5066", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "name" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "refsource" : "", + "tags" : [ "Release Notes" ] + }, { + "url" : "https://issues.chromium.org/issues/356658477", + "name" : "https://issues.chromium.org/issues/356658477", + "refsource" : "", + "tags" : [ "Permissions Required" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Inappropriate implementation in Messages in Google Chrome on Android prior to 137.0.7151.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "137.0.7151.55", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-29T15:50Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5065", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "name" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "refsource" : "", + "tags" : [ "Release Notes" ] + }, { + "url" : "https://issues.chromium.org/issues/40059071", + "name" : "https://issues.chromium.org/issues/40059071", + "refsource" : "", + "tags" : [ "Permissions Required" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Inappropriate implementation in FileSystemAccess API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "137.0.7151.55", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-29T15:50Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5064", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "name" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "refsource" : "", + "tags" : [ "Release Notes" ] + }, { + "url" : "https://issues.chromium.org/issues/40058068", + "name" : "https://issues.chromium.org/issues/40058068", + "refsource" : "", + "tags" : [ "Permissions Required" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Inappropriate implementation in Background Fetch API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "137.0.7151.55", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-29T15:51Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5063", + "ASSIGNER" : "chrome-cve-admin@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-416" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "name" : "https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html", + "refsource" : "", + "tags" : [ "Release Notes" ] + }, { + "url" : "https://issues.chromium.org/issues/411573532", + "name" : "https://issues.chromium.org/issues/411573532", + "refsource" : "", + "tags" : [ "Permissions Required" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Use after free in Compositing in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "137.0.7151.55", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T21:15Z", + "lastModifiedDate" : "2025-05-29T15:51Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46173", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/pruthuraut/CVE-2025-46173", + "name" : "https://github.com/pruthuraut/CVE-2025-46173", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.invicti.com/learn/blind-cross-site-scripting/", + "name" : "https://www.invicti.com/learn/blind-cross-site-scripting/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "code-projects Online Exam Mastering System 1.0 is vulnerable to Cross Site Scripting (XSS) via the name field in the feedback form." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T20:15Z", + "lastModifiedDate" : "2025-05-27T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-45529", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/sec-Kode/000fbab6dc649888bc196e76a4076b57", + "name" : "https://gist.github.com/sec-Kode/000fbab6dc649888bc196e76a4076b57", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/sec-Kode/cve/blob/main/cve2.md", + "name" : "https://github.com/sec-Kode/cve/blob/main/cve2.md", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An arbitrary file read vulnerability in the ReadTextAsynchronous function of SSCMS v7.3.1 allows attackers to read arbitrary files via sending a crafted GET request to /cms/templates/templatesAssetsEditor." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T19:15Z", + "lastModifiedDate" : "2025-05-27T21:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2872", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-47577. Reason: This candidate is a reservation duplicate of CVE-2025-47577. Notes: All CVE users should reference CVE-2025-47577 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T19:15Z", + "lastModifiedDate" : "2025-05-27T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-13966", + "ASSIGNER" : "cisa@example.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://krashconsulting.com/fury-of-fingers-biotime-rce/", + "name" : "url", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-148-01.json", + "name" : "url", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.cve.org/CVERecord?id=CVE-2024-13966", + "name" : "url", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://zkteco-store.ru/wp-content/uploads/2023/09/ZKBio-CVSecurity-6.0.0-User-Manual_EN-v1.0_20230616.pdf", + "name" : "url", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "ZKTeco BioTime allows unauthenticated attackers to enumerate usernames and log in as any user with a password unchanged from the default value '123456'. Users should change their passwords (located under the Attendance Settings tab as \"Self-Password\")." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T19:15Z", + "lastModifiedDate" : "2025-05-28T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5252", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Schatten-42/MyCVE/issues/12", + "name" : "https://github.com/Schatten-42/MyCVE/issues/12", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Schatten-42/MyCVE/issues/12", + "name" : "https://github.com/Schatten-42/MyCVE/issues/12", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310354", + "name" : "VDB-310354 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310354", + "name" : "VDB-310354 | PHPGurukul News Portal Project edit-subadmin.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584923", + "name" : "Submit #584923 | PHPGurukul News Portal Project 4.1 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul News Portal Project 4.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T18:15Z", + "lastModifiedDate" : "2025-05-27T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-45475", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.yuque.com/morysummer/vx41bz/dzidfm8vn2h5k1lb", + "name" : "https://www.yuque.com/morysummer/vx41bz/dzidfm8vn2h5k1lb", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "maccms10 v2025.1000.4047 is vulnerable to Server-Side request forgery (SSRF) in Friend Link Management." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T18:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-49197", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-49197/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-49197/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue was discovered in Wi-Fi in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930, and W1000. Lack of a boundary check in STOP_KEEP_ALIVE_OFFLOAD leads to out-of-bounds access." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T18:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5251", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Schatten-42/MyCVE/issues/11", + "name" : "https://github.com/Schatten-42/MyCVE/issues/11", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310353", + "name" : "VDB-310353 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310353", + "name" : "VDB-310353 | PHPGurukul News Portal Project edit-subcategory.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584922", + "name" : "Submit #584922 | PHPGurukul News Portal Project 4.1 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul News Portal Project 4.1. It has been classified as critical. This affects an unknown part of the file /admin/edit-subcategory.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T17:15Z", + "lastModifiedDate" : "2025-05-27T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5250", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Schatten-42/MyCVE/issues/10", + "name" : "https://github.com/Schatten-42/MyCVE/issues/10", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310352", + "name" : "VDB-310352 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310352", + "name" : "VDB-310352 | PHPGurukul News Portal Project edit-category.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584911", + "name" : "Submit #584911 | PHPGurukul News Portal Project 4.1 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul News Portal Project 4.1 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-category.php. The manipulation of the argument Category leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T17:15Z", + "lastModifiedDate" : "2025-05-27T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5249", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Schatten-42/MyCVE/issues/9", + "name" : "https://github.com/Schatten-42/MyCVE/issues/9", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310351", + "name" : "VDB-310351 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310351", + "name" : "VDB-310351 | PHPGurukul News Portal Project add-category.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584903", + "name" : "Submit #584903 | PHPGurukul News Portal Project 4.1 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in PHPGurukul News Portal Project 4.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/add-category.php. The manipulation of the argument Category leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T17:15Z", + "lastModifiedDate" : "2025-05-27T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48057", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-296" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Icinga/icinga2/commit/34c93a2542bbe4e9886d15bc17ec929ead1aa152", + "name" : "https://github.com/Icinga/icinga2/commit/34c93a2542bbe4e9886d15bc17ec929ead1aa152", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Icinga/icinga2/commit/4023128be42b18a011dda71ddee9ca79955b89cb", + "name" : "https://github.com/Icinga/icinga2/commit/4023128be42b18a011dda71ddee9ca79955b89cb", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Icinga/icinga2/commit/60f75f4a3d5cbb234eb3694ba7e9076a1a5b8776", + "name" : "https://github.com/Icinga/icinga2/commit/60f75f4a3d5cbb234eb3694ba7e9076a1a5b8776", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Icinga/icinga2/commit/9ad5683aab9eb392c6737ff46c830a945c9e240f", + "name" : "https://github.com/Icinga/icinga2/commit/9ad5683aab9eb392c6737ff46c830a945c9e240f", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Icinga/icinga2/commit/9b2c05d0cc09210bdeade77cf9a73859250fc48d", + "name" : "https://github.com/Icinga/icinga2/commit/9b2c05d0cc09210bdeade77cf9a73859250fc48d", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Icinga/icinga2/security/advisories/GHSA-7vcf-f5v9-3wr6", + "name" : "https://github.com/Icinga/icinga2/security/advisories/GHSA-7vcf-f5v9-3wr6", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Icinga 2 is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. Prior to versions 2.12.12, 2.13.12, and 2.14.6, the VerifyCertificate() function can be tricked into incorrectly treating certificates as valid. This allows an attacker to send a malicious certificate request that is then treated as a renewal of an already existing certificate, resulting in the attacker obtaining a valid certificate that can be used to impersonate trusted nodes. This only occurs when Icinga 2 is built with OpenSSL older than version 1.1.0. This issue has been patched in versions 2.12.12, 2.13.12, and 2.14.6." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T17:15Z", + "lastModifiedDate" : "2025-05-27T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-23247", + "ASSIGNER" : "psirt@nvidia.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5643", + "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5643", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2151", + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2151", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a failure to check the length of a buffer could allow a user to cause the tool to crash or execute arbitrary code by passing in a malformed ELF file. A successful exploit of this vulnerability might lead to arbitrary code execution." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T17:15Z", + "lastModifiedDate" : "2025-06-02T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-22377", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-22377/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-22377/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400. A Heap-based Out-of-Bounds Write exists in the GPRS protocol implementation because of a mismatch between the actual length of the payload and the length declared within the payload." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T17:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-49196", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-49196/", + "name" : "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-49196/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An issue was discovered in the GPU in Samsung Mobile Processor Exynos 1480 and 2400. Type confusion leads to a Denial of Service." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T17:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5248", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/zzb1388/zzb1/issues/8", + "name" : "https://github.com/zzb1388/zzb1/issues/8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310350", + "name" : "VDB-310350 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310350", + "name" : "VDB-310350 | PHPGurukul Company Visitor Management System bwdates-reports-details.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584823", + "name" : "Submit #584823 | Phpgurukul Company Visitors Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in PHPGurukul Company Visitor Management System 1.0. Affected is an unknown function of the file /bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T16:15Z", + "lastModifiedDate" : "2025-05-27T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48370", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-287" + }, { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/supabase/auth-js/pull/1063", + "name" : "https://github.com/supabase/auth-js/pull/1063", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/supabase/auth-js/security/advisories/GHSA-8r88-6cj9-9fh5", + "name" : "https://github.com/supabase/auth-js/security/advisories/GHSA-8r88-6cj9-9fh5", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "auth-js is an isomorphic Javascript library for Supabase Auth. Prior to version 2.69.1, the library functions getUserById, deleteUser, updateUserById, listFactors and deleteFactor did not require the user supplied values to be valid UUIDs. This could lead to a URL path traversal, resulting in the wrong API function being called. Implementations that follow security best practice and validate user controlled inputs, such as the userId are not affected by this. This issue has been patched in version 2.69.1." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T16:15Z", + "lastModifiedDate" : "2025-05-27T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27701", + "ASSIGNER" : "dsap-vuln-management@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://source.android.com/security/bulletin/pixel/2025-05-01", + "name" : "https://source.android.com/security/bulletin/pixel/2025-05-01", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the function process_crypto_cmd, the values of ptrs[i] can be potentially equal to NULL which is valid value after calling slice_map_array(). Later this values will be derefenced without prior NULL check, which can lead to local Temporary DoS or OOB Read, leading to information disclosure." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T16:15Z", + "lastModifiedDate" : "2025-05-27T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-27700", + "ASSIGNER" : "dsap-vuln-management@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://source.android.com/security/bulletin/pixel/2025-05-01", + "name" : "https://source.android.com/security/bulletin/pixel/2025-05-01", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "There is a possible bypass of carrier restrictions due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T16:15Z", + "lastModifiedDate" : "2025-05-27T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-56193", + "ASSIGNER" : "dsap-vuln-management@google.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://source.android.com/security/bulletin/pixel/2025-05-01", + "name" : "https://source.android.com/security/bulletin/pixel/2025-05-01", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "There is a possible disclosure of Bluetooth adapter details due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T16:15Z", + "lastModifiedDate" : "2025-05-29T19:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-21138", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T16:15Z", + "lastModifiedDate" : "2025-05-27T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2022-0003", + "ASSIGNER" : "secure@intel.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T16:15Z", + "lastModifiedDate" : "2025-05-27T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5247", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/A7cc/cve/issues/5", + "name" : "https://github.com/A7cc/cve/issues/5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/A7cc/cve/issues/5", + "name" : "https://github.com/A7cc/cve/issues/5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310349", + "name" : "VDB-310349 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310349", + "name" : "VDB-310349 | Gowabby HFish url.go LoadUrl improper authentication", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584798", + "name" : "Submit #584798 | Gowabby HFish 0.1 Permission bypass", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in Gowabby HFish 0.1. This issue affects the function LoadUrl of the file \\view\\url.go. The manipulation of the argument r leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T15:15Z", + "lastModifiedDate" : "2025-05-27T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5246", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/snkercyber/CVE/issues/5", + "name" : "https://github.com/snkercyber/CVE/issues/5", + "refsource" : "", + "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ] + }, { + "url" : "https://github.com/snkercyber/CVE/issues/5", + "name" : "https://github.com/snkercyber/CVE/issues/5", + "refsource" : "", + "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ] + }, { + "url" : "https://vuldb.com/?ctiid.310348", + "name" : "VDB-310348 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ "Permissions Required", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?id.310348", + "name" : "VDB-310348 | Campcodes Online Hospital Management System query-details.php sql injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?submit.584718", + "name" : "Submit #584718 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ "Product" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in Campcodes Online Hospital Management System 1.0. This vulnerability affects unknown code of the file /hms/admin/query-details.php. The manipulation of the argument adminremark leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T15:15Z", + "lastModifiedDate" : "2025-05-28T20:38Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5245", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=16004", + "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=16004", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32829", + "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32829", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a", + "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310347", + "name" : "VDB-310347 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310347", + "name" : "VDB-310347 | GNU Binutils objdump debug.c debug_type_samep memory corruption", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584635", + "name" : "Submit #584635 | GNU Binutils objdump 2.44 Memory Corruption", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.gnu.org/", + "name" : "https://www.gnu.org/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T15:15Z", + "lastModifiedDate" : "2025-05-27T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48383", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-918" + }, { + "lang" : "en", + "value" : "CWE-402" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/codingjoe/django-select2/commit/e5f41e6edba004d35f94915ff5e2559f44853412", + "name" : "https://github.com/codingjoe/django-select2/commit/e5f41e6edba004d35f94915ff5e2559f44853412", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/codingjoe/django-select2/security/advisories/GHSA-wjrh-hj83-3wh7", + "name" : "https://github.com/codingjoe/django-select2/security/advisories/GHSA-wjrh-hj83-3wh7", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Django-Select2 is a Django integration for Select2. Prior to version 8.4.1, instances of HeavySelect2Mixin subclasses like the ModelSelect2MultipleWidget and ModelSelect2Widget can leak secret access tokens across requests. This can allow users to access restricted query sets and restricted data. This issue has been patched in version 8.4.1." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T15:15Z", + "lastModifiedDate" : "2025-05-27T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-3704", + "ASSIGNER" : "audit@patchstack.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/dbarproductions/pta-volunteer-sign-up-sheets/archive/refs/tags/5.5.5.zip", + "name" : "https://github.com/dbarproductions/pta-volunteer-sign-up-sheets/archive/refs/tags/5.5.5.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://patchstack.com/database/wordpress/plugin/pta-volunteer-sign-up-sheets/vulnerability/wordpress-volunteer-sign-up-sheets-plugin-5-5-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "name" : "https://patchstack.com/database/wordpress/plugin/pta-volunteer-sign-up-sheets/vulnerability/wordpress-volunteer-sign-up-sheets-plugin-5-5-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DBAR Productions Volunteer Sign Up Sheets allows Stored XSS.This issue affects Volunteer Sign Up Sheets: from n/a before 5.5.5.\n\nThe patch is available exclusively on GitHub at https://github.com/dbarproductions/pta-volunteer-sign-up-sheets , as the vendor encounters difficulties using SVN to deploy to the WordPress.org repository." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T15:15Z", + "lastModifiedDate" : "2025-05-27T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2236", + "ASSIGNER" : "security@opentext.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-497" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://portal.microfocus.com/s/article/KM000039947", + "name" : "https://portal.microfocus.com/s/article/KM000039947", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in OpenText Advanced Authentication allows Information Elicitation. The vulnerability could reveal sensitive information while managing and configuring of the external services.\n\nThis issue affects Advanced Authentication versions before 6.5." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T15:15Z", + "lastModifiedDate" : "2025-05-27T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48798", + "ASSIGNER" : "secalert@redhat.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-416" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://access.redhat.com/security/cve/CVE-2025-48798", + "name" : "https://access.redhat.com/security/cve/CVE-2025-48798", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2368557", + "name" : "RHBZ#2368557", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A flaw was found in GIMP when processing XCF image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing use-after-free issues." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.3, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T14:15Z", + "lastModifiedDate" : "2025-05-27T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48797", + "ASSIGNER" : "secalert@redhat.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-122" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://access.redhat.com/security/cve/CVE-2025-48797", + "name" : "https://access.redhat.com/security/cve/CVE-2025-48797", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2368558", + "name" : "RHBZ#2368558", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A flaw was found in GIMP when processing certain TGA image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing a heap buffer overflow." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.3, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T14:15Z", + "lastModifiedDate" : "2025-05-27T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48796", + "ASSIGNER" : "secalert@redhat.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-121" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://access.redhat.com/security/cve/CVE-2025-48796", + "name" : "https://access.redhat.com/security/cve/CVE-2025-48796", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2368559", + "name" : "RHBZ#2368559", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A flaw was found in GIMP. The GIMP ani_load_image() function is vulnerable to a stack-based overflow. If a user opens.ANI files, GIMP may be used to store more information than the capacity allows. This flaw allows a malicious ANI file to trigger arbitrary code execution." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 1.3, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T14:15Z", + "lastModifiedDate" : "2025-05-27T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5272", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1726254%2C1742738%2C1960121", + "name" : "Memory safety bugs fixed in Firefox 139 and Thunderbird 139", + "refsource" : "", + "tags" : [ "Broken Link" ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory safety bugs present in Firefox 138 and Thunderbird 138. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 139." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "139.0", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "139.0", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-28T18:35Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5271", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1920348", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1920348", + "refsource" : "", + "tags" : [ "Permissions Required" ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Previewing a response in Devtools ignored CSP headers, which could have allowed content injection attacks. This vulnerability affects Firefox < 139." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "139.0", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-28T18:35Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5270", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1910298", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1910298", + "refsource" : "", + "tags" : [ "Permissions Required" ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In certain cases, SNI could have been sent unencrypted even when encrypted DNS was enabled. This vulnerability affects Firefox < 139." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "139.0", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-28T18:36Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5269", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1924108", + "name" : "Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird 128.11", + "refsource" : "", + "tags" : [ "Permissions Required" ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "refsource" : "", + "tags" : [ "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 128.11." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding" : "128.11.0", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "128.11.0", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-30T01:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5268", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1950136%2C1958121%2C1960499%2C1962634", + "name" : "Memory safety bugs fixed in Firefox 139, Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11", + "refsource" : "", + "tags" : [ "Broken Link" ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ "Vendor Advisory" ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "refsource" : "", + "tags" : [ "Vendor Advisory" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding" : "128.11.0", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding" : "139.0", + "cpe_name" : [ ] + }, { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding" : "130.0", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-30T01:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5267", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1954137", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1954137", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-27T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5266", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1965628", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1965628", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-27T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5265", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1962301", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1962301", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-43/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-43/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.\n*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-27T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5264", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1950001", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1950001", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-43/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-43/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-27T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5263", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1960745", + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1960745", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-42/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-43/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-43/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "name" : "https://www.mozilla.org/security/advisories/mfsa2025-44/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-27T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5262", + "ASSIGNER" : "security@mozilla.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: This CVE was accidentally assigned by Mozilla but should be assigned by another CNA. When the correct CVE is available, Mozilla's advisories will be updated to reflect that identifier." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-27T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5244", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=16010", + "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=16010", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32858", + "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32858", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5", + "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310346", + "name" : "VDB-310346 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310346", + "name" : "VDB-310346 | GNU Binutils ld elflink.c elf_gc_sweep memory corruption", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584634", + "name" : "Submit #584634 | GNU Binutils ld 2.44 Memory Corruption", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.gnu.org/", + "name" : "https://www.gnu.org/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T13:15Z", + "lastModifiedDate" : "2025-05-27T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5117", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/admin/pages/payment-inc/paypal-submit.php#L128", + "name" : "https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/admin/pages/payment-inc/paypal-submit.php#L128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/property.php#L1964", + "name" : "https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/property.php#L1964", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3299714/", + "name" : "https://plugins.trac.wordpress.org/changeset/3299714/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wordpress.org/plugins/property/#developers", + "name" : "https://wordpress.org/plugins/property/#developers", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/df48f7f9-7bc9-4f9b-b9b5-6bfb86309030?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/df48f7f9-7bc9-4f9b-b9b5-6bfb86309030?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author-level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T12:15Z", + "lastModifiedDate" : "2025-05-27T12:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4412", + "ASSIGNER" : "cvd@cert.pl" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-276" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.pl/en/posts/2025/05/tcc-bypass/", + "name" : "https://cert.pl/en/posts/2025/05/tcc-bypass/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sparklabs.com/viscosity/", + "name" : "https://www.sparklabs.com/viscosity/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "On macOS systems, by utilizing a Launch Agent and loading the viscosity_openvpn process from the application bundle, it is possible to load a dynamic library with Viscosity's TCC (Transparency, Consent, and Control) identity. The acquired resource access is limited without entitlements such as access to the camera or microphone. Only user-granted permissions for file resources apply. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.\n\nThis issue was fixed in version 1.11.5 of Viscosity." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T10:15Z", + "lastModifiedDate" : "2025-05-27T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41653", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-410" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://certvde.com/en/advisories/VDE-2025-044/", + "name" : "https://certvde.com/en/advisories/VDE-2025-044/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device's web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 7.5, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-27T09:15Z", + "lastModifiedDate" : "2025-05-27T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41652", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-656" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://certvde.com/en/advisories/VDE-2025-044/", + "name" : "https://certvde.com/en/advisories/VDE-2025-044/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T09:15Z", + "lastModifiedDate" : "2025-05-27T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41651", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-306" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://certvde.com/en/advisories/VDE-2025-044/", + "name" : "https://certvde.com/en/advisories/VDE-2025-044/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T09:15Z", + "lastModifiedDate" : "2025-05-27T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41650", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1287" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://certvde.com/en/advisories/VDE-2025-044/", + "name" : "https://certvde.com/en/advisories/VDE-2025-044/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 7.5, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-27T09:15Z", + "lastModifiedDate" : "2025-05-27T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41649", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-787" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://certvde.com/en/advisories/VDE-2025-044/", + "name" : "https://certvde.com/en/advisories/VDE-2025-044/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 7.5, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-27T09:15Z", + "lastModifiedDate" : "2025-05-27T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-2407", + "ASSIGNER" : "vulnerability@ncsc.ch" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://mobatimemtsl.github.io/Vulnerability-References/", + "name" : "https://mobatimemtsl.github.io/Vulnerability-References/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Missing Authentication & Authorization in Web-API in Mobatime AMX MTAPI v6 on IIS allows adversaries to unrestricted access via the network. The vulnerability is fixed in Version 1.5." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T08:15Z", + "lastModifiedDate" : "2025-05-27T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-23393", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-80" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23393", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23393", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in  spacewalk-java allows execution of arbitrary Javascript code on users machines.This issue affects Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T08:15Z", + "lastModifiedDate" : "2025-05-27T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-47090", + "ASSIGNER" : "security@checkmk.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.nagvis.org/downloads/changelog/1.9.47", + "name" : "https://www.nagvis.org/downloads/changelog/1.9.47", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper neutralization of input in Nagvis before version 1.9.47 which can lead to XSS" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T07:15Z", + "lastModifiedDate" : "2025-05-27T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2024-38866", + "ASSIGNER" : "security@checkmk.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/NagVis/nagvis/pull/398/commits/8d5d07e22dfca78df7420ac81cffff6f45ca9694", + "name" : "https://github.com/NagVis/nagvis/pull/398/commits/8d5d07e22dfca78df7420ac81cffff6f45ca9694", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.nagvis.org/downloads/changelog/1.9.47", + "name" : "https://www.nagvis.org/downloads/changelog/1.9.47", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper neutralization of input in Nagvis before version 1.9.47 which can lead to livestatus injection" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T07:15Z", + "lastModifiedDate" : "2025-05-27T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5232", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/6BXK6/cve/issues/11", + "name" : "https://github.com/6BXK6/cve/issues/11", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310331", + "name" : "VDB-310331 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310331", + "name" : "VDB-310331 | PHPGurukul Student Study Center Management System report.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584508", + "name" : "Submit #584508 | PHPGurukul Student Study Center Management System using PHP and MySQL V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in PHPGurukul Student Study Center Management System 1.0. This issue affects some unknown processing of the file /admin/report.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 4.7, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.2, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T05:15Z", + "lastModifiedDate" : "2025-05-27T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5231", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/zzb1388/zzb1/issues/2", + "name" : "https://github.com/zzb1388/zzb1/issues/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310330", + "name" : "VDB-310330 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310330", + "name" : "VDB-310330 | PHPGurukul Company Visitor Management System forgot-password.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584438", + "name" : "Submit #584438 | Phpgurukul Company Visitors Management System V1.0 SQL injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in PHPGurukul Company Visitor Management System 1.0. This vulnerability affects unknown code of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T05:15Z", + "lastModifiedDate" : "2025-05-27T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48382", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-732" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/codelibs/fess/commit/25b2009fea2a0f6ccd5aa8154aa54b536c08f6c4", + "name" : "https://github.com/codelibs/fess/commit/25b2009fea2a0f6ccd5aa8154aa54b536c08f6c4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/codelibs/fess/security/advisories/GHSA-g88v-2j67-9rmx", + "name" : "https://github.com/codelibs/fess/security/advisories/GHSA-g88v-2j67-9rmx", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Fess is a deployable Enterprise Search Server. Prior to version 14.19.2, the createTempFile() method in org.codelibs.fess.helper.SystemHelper creates temporary files without explicitly setting restrictive permissions. This could lead to potential information disclosure, allowing unauthorized local users to access sensitive data contained in these files. This issue primarily affects environments where Fess is deployed in a shared or multi-user context. Typical single-user or isolated deployments have minimal or negligible practical impact. This issue has been patched in version 14.19.2. A workaround for this issue involves ensuring local access to the environment running Fess is restricted to trusted users only." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T05:15Z", + "lastModifiedDate" : "2025-05-27T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48054", + "ASSIGNER" : "security-advisories@github.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-1321" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/radashi-org/radashi/commit/8147abc8cfc3cfe9b9a17cd389076a5d97235a66", + "name" : "https://github.com/radashi-org/radashi/commit/8147abc8cfc3cfe9b9a17cd389076a5d97235a66", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/radashi-org/radashi/security/advisories/GHSA-2xv9-ghh9-xc69", + "name" : "https://github.com/radashi-org/radashi/security/advisories/GHSA-2xv9-ghh9-xc69", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Radashi is a TypeScript utility toolkit. Prior to version 12.5.1, the set function within the Radashi library is vulnerable to prototype pollution. If an attacker can control parts of the path argument to the set function, they could potentially modify the prototype of all objects in the JavaScript runtime, leading to unexpected behavior, denial of service, or even remote code execution in some specific scenarios. This issue has been patched in version 12.5.1. A workaround for this issue involves sanitizing the path argument provided to the set function to ensure that no part of the path string is __proto__, prototype, or constructor." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T05:15Z", + "lastModifiedDate" : "2025-05-27T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5230", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/webzzaa/CVE-/issues/1", + "name" : "https://github.com/webzzaa/CVE-/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310329", + "name" : "VDB-310329 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310329", + "name" : "VDB-310329 | PHPGurukul Online Nurse Hiring System bwdates-report-details.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584042", + "name" : "Submit #584042 | PhpGurukul Online Nurse Hiring System V1.0 SQL injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in PHPGurukul Online Nurse Hiring System 1.0. This affects an unknown part of the file /admin/bwdates-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5229", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/sarryi/cve/issues/1", + "name" : "https://github.com/sarryi/cve/issues/1", + "refsource" : "", + "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ] + }, { + "url" : "https://vuldb.com/?ctiid.310328", + "name" : "VDB-310328 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ "Permissions Required", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?id.310328", + "name" : "VDB-310328 | Campcodes Online Hospital Management System view-patient.php sql injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?submit.583490", + "name" : "Submit #583490 | Campcodes Online Hospital Management System V1.0 SQL injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ "Product" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Campcodes Online Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/view-patient.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-28T20:38Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5228", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-121" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/xubeining/Cve_report/blob/main/The%20D-Link%20DI-8100%20contains%20a%20binary%20vulnerability.md", + "name" : "https://github.com/xubeining/Cve_report/blob/main/The%20D-Link%20DI-8100%20contains%20a%20binary%20vulnerability.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310326", + "name" : "VDB-310326 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310326", + "name" : "VDB-310326 | D-Link DI-8100 jhttpd login.cgi httpd_get_parm stack-based overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583430", + "name" : "Submit #583430 | D-Link DI-8100 8100 Stack-based Buffer Overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.dlink.com/", + "name" : "https://www.dlink.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in D-Link DI-8100 up to 20250523. It has been classified as critical. Affected is the function httpd_get_parm of the file /login.cgi of the component jhttpd. The manipulation of the argument notify leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "ADJACENT_NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 8.8, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5227", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/bleakTS/myCVE/issues/18", + "name" : "https://github.com/bleakTS/myCVE/issues/18", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310325", + "name" : "VDB-310325 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310325", + "name" : "VDB-310325 | PHPGurukul Small CRM manage-tickets.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583423", + "name" : "Submit #583423 | phpgurukul Small CRM v3.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul Small CRM 3.0 and classified as critical. This issue affects some unknown processing of the file /admin/manage-tickets.php. The manipulation of the argument aremark leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48828", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/", + "name" : "https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce", + "name" : "https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://kevintel.com/CVE-2025-48828", + "name" : "https://kevintel.com/CVE-2025-48828", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the \"var_dump\"(\"test\") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48827", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/", + "name" : "https://blog.kevintel.com/vbulletin-replaceadtemplate-kev/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce", + "name" : "https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://kevintel.com/CVE-2025-48827", + "name" : "https://kevintel.com/CVE-2025-48827", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48794", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48793", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48792", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48791", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48790", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48789", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48788", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48787", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48786", + "ASSIGNER" : "psirt@fortinet.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Rejected reason: Not used" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48742", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://forge.sigb.net/projects/pmb/wiki/Changelog_801#CHANGE-LOG-8012-2025-03-03", + "name" : "https://forge.sigb.net/projects/pmb/wiki/Changelog_801#CHANGE-LOG-8012-2025-03-03", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sigb.net/index.php?lvl=cmspage&pageid=6&id_rubrique=553&opac_view=1", + "name" : "https://www.sigb.net/index.php?lvl=cmspage&pageid=6&id_rubrique=553&opac_view=1", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The installer in SIGB PMB before and fixed in v.8.0.1.2 allows remote code execution." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-29T17:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-26211", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-352" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/GibbonEdu/core/blob/be891ab97b058a933b68354559457c9e310c13b8/modules/Timetable%20Admin/tt_delete.php#L24", + "name" : "https://github.com/GibbonEdu/core/blob/be891ab97b058a933b68354559457c9e310c13b8/modules/Timetable%20Admin/tt_delete.php#L24", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/GibbonEdu/core/releases/tag/v29.0.00", + "name" : "https://github.com/GibbonEdu/core/releases/tag/v29.0.00", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Gibbon before 29.0.00 allows CSRF." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T04:15Z", + "lastModifiedDate" : "2025-05-27T04:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5226", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/bleakTS/myCVE/issues/17", + "name" : "https://github.com/bleakTS/myCVE/issues/17", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310324", + "name" : "VDB-310324 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310324", + "name" : "VDB-310324 | PHPGurukul Small CRM change-password.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.583408", + "name" : "Submit #583408 | phpgurukul Small CRM v3.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in PHPGurukul Small CRM 3.0 and classified as critical. This vulnerability affects unknown code of the file /admin/change-password.php. The manipulation of the argument oldpass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T03:15Z", + "lastModifiedDate" : "2025-05-27T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5225", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/bleakTS/myCVE/issues/16", + "name" : "https://github.com/bleakTS/myCVE/issues/16", + "refsource" : "", + "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ] + }, { + "url" : "https://vuldb.com/?ctiid.310323", + "name" : "VDB-310323 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ "Permissions Required", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?id.310323", + "name" : "VDB-310323 | Campcodes Advanced Online Voting System index.php sql injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?submit.583397", + "name" : "Submit #583397 | Campcodes Advanced Online Voting System v1.0 SQL Injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ "Product" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in Campcodes Advanced Online Voting System 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument voter leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:campcodes:advanced_online_voting_system:1.0:*:*:*:*:*:*:*", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T03:15Z", + "lastModifiedDate" : "2025-05-28T20:38Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5224", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/kkive/cve/issues/1", + "name" : "https://github.com/kkive/cve/issues/1", + "refsource" : "", + "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ] + }, { + "url" : "https://vuldb.com/?ctiid.310320", + "name" : "VDB-310320 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ "Permissions Required", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?id.310320", + "name" : "VDB-310320 | Campcodes Online Hospital Management System add-doctor.php sql injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://vuldb.com/?submit.583029", + "name" : "Submit #583029 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ "Third Party Advisory", "VDB Entry" ] + }, { + "url" : "https://www.campcodes.com/", + "name" : "https://www.campcodes.com/", + "refsource" : "", + "tags" : [ "Product" ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in Campcodes Online Hospital Management System 1.0. Affected is an unknown function of the file /admin/add-doctor.php. The manipulation of the argument Doctorspecialization leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ { + "operator" : "OR", + "children" : [ ], + "cpe_match" : [ { + "vulnerable" : true, + "cpe23Uri" : "cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:*", + "cpe_name" : [ ] + } ] + } ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "availabilityImpact" : "HIGH", + "baseScore" : 9.8, + "baseSeverity" : "CRITICAL" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 5.9 + } + }, + "publishedDate" : "2025-05-27T03:15Z", + "lastModifiedDate" : "2025-05-28T20:46Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5221", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fitoxs.com/exploit/exploit-62e89ab8b510813fd7e0a3a5fbc6e6b7f7e3ec7dd7c8f6244c82cf82dc11d51c.txt", + "name" : "https://fitoxs.com/exploit/exploit-62e89ab8b510813fd7e0a3a5fbc6e6b7f7e3ec7dd7c8f6244c82cf82dc11d51c.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310317", + "name" : "VDB-310317 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310317", + "name" : "VDB-310317 | FreeFloat FTP Server QUOTE Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582971", + "name" : "Submit #582971 | FreeFloat FTP Server 1.0.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in FreeFloat FTP Server 1.0.0. It has been classified as critical. This affects an unknown part of the component QUOTE Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T03:15Z", + "lastModifiedDate" : "2025-05-27T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4683", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/mstore-api/tags/4.17.5/controllers/helpers/blog-helper.php#L24", + "name" : "https://plugins.trac.wordpress.org/browser/mstore-api/tags/4.17.5/controllers/helpers/blog-helper.php#L24", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/mstore-api/tags/4.17.5/controllers/helpers/blog-helper.php#L46", + "name" : "https://plugins.trac.wordpress.org/browser/mstore-api/tags/4.17.5/controllers/helpers/blog-helper.php#L46", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3293669/", + "name" : "https://plugins.trac.wordpress.org/changeset/3293669/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b335bd15-7af7-4d8b-ad01-b1d9e76beb53?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b335bd15-7af7-4d8b-ad01-b1d9e76beb53?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the create_blog function in all versions up to, and including, 4.17.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new posts." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-27T03:15Z", + "lastModifiedDate" : "2025-05-27T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4682", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/5.4.0/src/blocks/post-carousel/src/frontend.js", + "name" : "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/5.4.0/src/blocks/post-carousel/src/frontend.js", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/5.4.0/src/blocks/slider/src/frontend.js", + "name" : "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/5.4.0/src/blocks/slider/src/frontend.js", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://plugins.trac.wordpress.org/changeset/3296386/", + "name" : "https://plugins.trac.wordpress.org/changeset/3296386/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f88f065d-14ca-4547-9a41-f9177979a9ed?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f88f065d-14ca-4547-9a41-f9177979a9ed?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via HTML attributes in Slider and Post Carousel widgets in all versions up to, and including, 5.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-27T03:15Z", + "lastModifiedDate" : "2025-05-27T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48744", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-22" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://forge.sigb.net/projects/pmb/wiki/Changelog_801#CHANGE-LOG-8012-2025-03-03", + "name" : "https://forge.sigb.net/projects/pmb/wiki/Changelog_801#CHANGE-LOG-8012-2025-03-03", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sigb.net/index.php?lvl=cmspage&pageid=6&id_rubrique=553&opac_view=1", + "name" : "https://www.sigb.net/index.php?lvl=cmspage&pageid=6&id_rubrique=553&opac_view=1", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In SIGB PMB before 8.0.1.2, attackers can achieve Local File Inclusion and remote code execution." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T03:15Z", + "lastModifiedDate" : "2025-05-27T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-48743", + "ASSIGNER" : "cve@mitre.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://forge.sigb.net/projects/pmb/wiki/Changelog_801#CHANGE-LOG-8012-2025-03-03", + "name" : "https://forge.sigb.net/projects/pmb/wiki/Changelog_801#CHANGE-LOG-8012-2025-03-03", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sigb.net/index.php?lvl=cmspage&pageid=6&id_rubrique=553&opac_view=1", + "name" : "https://www.sigb.net/index.php?lvl=cmspage&pageid=6&id_rubrique=553&opac_view=1", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SIGB PMB before 8.0.1.2 allows SQL injection." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T03:15Z", + "lastModifiedDate" : "2025-05-27T03:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5220", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fitoxs.com/exploit/exploit-1c5dc6c9823d6c734b7dd46458c5196ad7a8c902542c54c7465d38de84bc3ee2.txt", + "name" : "https://fitoxs.com/exploit/exploit-1c5dc6c9823d6c734b7dd46458c5196ad7a8c902542c54c7465d38de84bc3ee2.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310316", + "name" : "VDB-310316 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310316", + "name" : "VDB-310316 | FreeFloat FTP Server GET Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582970", + "name" : "Submit #582970 | FreeFloat FTP Server 1.0.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in FreeFloat FTP Server 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the component GET Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T02:15Z", + "lastModifiedDate" : "2025-05-27T02:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-33079", + "ASSIGNER" : "psirt@us.ibm.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-256" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.ibm.com/support/pages/node/7234720", + "name" : "https://www.ibm.com/support/pages/node/7234720", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "IBM Controller 11.0.0, 11.0.1, and 11.1.0 application could allow an authenticated user to obtain sensitive credentials that may be inadvertently included within the source code." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 6.5, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-27T02:15Z", + "lastModifiedDate" : "2025-05-27T02:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5219", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fitoxs.com/exploit/exploit-c4b40241c6bfa9b9e13cbb33e1bd5a471e8855e7eaf2eb12a997c72cb5de7611.txt", + "name" : "https://fitoxs.com/exploit/exploit-c4b40241c6bfa9b9e13cbb33e1bd5a471e8855e7eaf2eb12a997c72cb5de7611.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310315", + "name" : "VDB-310315 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310315", + "name" : "VDB-310315 | FreeFloat FTP Server ASCII Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582968", + "name" : "Submit #582968 | FreeFloat FTP Server 1.0.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in FreeFloat FTP Server 1.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component ASCII Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T01:15Z", + "lastModifiedDate" : "2025-05-27T01:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5218", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fitoxs.com/exploit/exploit-f66cb45bc43c5d8d4240ce755cfd9a7be5b31de1e85f92ccf8e1c607b849bb5a.txt", + "name" : "https://fitoxs.com/exploit/exploit-f66cb45bc43c5d8d4240ce755cfd9a7be5b31de1e85f92ccf8e1c607b849bb5a.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://fitoxs.com/exploit/exploit-f66cb45bc43c5d8d4240ce755cfd9a7be5b31de1e85f92ccf8e1c607b849bb5a.txt", + "name" : "https://fitoxs.com/exploit/exploit-f66cb45bc43c5d8d4240ce755cfd9a7be5b31de1e85f92ccf8e1c607b849bb5a.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310314", + "name" : "VDB-310314 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310314", + "name" : "VDB-310314 | FreeFloat FTP Server LITERAL Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582965", + "name" : "Submit #582965 | FreeFloat FTP Server 1.0.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0.0. Affected is an unknown function of the component LITERAL Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T01:15Z", + "lastModifiedDate" : "2025-05-27T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5217", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-119" + }, { + "lang" : "en", + "value" : "CWE-120" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://fitoxs.com/exploit/exploit-11a137f0dc647e7b9dc59c6aa449c7d086bcd152f6167cf531d3eec5ebce5bc7.txt", + "name" : "https://fitoxs.com/exploit/exploit-11a137f0dc647e7b9dc59c6aa449c7d086bcd152f6167cf531d3eec5ebce5bc7.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310313", + "name" : "VDB-310313 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310313", + "name" : "VDB-310313 | FreeFloat FTP Server RMDIR Command buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582963", + "name" : "Submit #582963 | FreeFloat FTP Server 1.0.0 Buffer Overflow", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0.0. This issue affects some unknown processing of the component RMDIR Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T01:15Z", + "lastModifiedDate" : "2025-05-27T01:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5216", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/y7syeu/CVE/issues/1", + "name" : "https://github.com/y7syeu/CVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310312", + "name" : "VDB-310312 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310312", + "name" : "VDB-310312 | PHPGurukul Student Record System login.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582936", + "name" : "Submit #582936 | PHPGurukul Students Record Management Project in PHP V 3.20 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in PHPGurukul Student Record System 3.20. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T01:15Z", + "lastModifiedDate" : "2025-05-27T01:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5215", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/xiaobor123/vul-dlink-dcs5020l", + "name" : "https://github.com/xiaobor123/vul-dlink-dcs5020l", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/xiaobor123/vul-dlink-dcs5020l", + "name" : "https://github.com/xiaobor123/vul-dlink-dcs5020l", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/xiaobor123/vul-dlink-dcs5020l#poc", + "name" : "https://github.com/xiaobor123/vul-dlink-dcs5020l#poc", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310311", + "name" : "VDB-310311 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310311", + "name" : "VDB-310311 | D-Link DCS-5020L ptdc.cgi websReadEvent stack-based overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582935", + "name" : "Submit #582935 | dlink dcs-5020l FIRMWARE_1.01_B2 stack-based buffer overflow", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.dlink.com/", + "name" : "https://www.dlink.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in D-Link DCS-5020L 1.01_B2. This affects the function websReadEvent of the file /rame/ptdc.cgi. The manipulation of the argument Authorization leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-27T00:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5214", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ShenHao5201314/cve/issues/1", + "name" : "https://github.com/ShenHao5201314/cve/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310310", + "name" : "VDB-310310 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310310", + "name" : "VDB-310310 | Kashipara Responsive Online Learing Platform course_detail_user_new.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582929", + "name" : "Submit #582929 | kashipara Responsive Online Learing Platform In Php 1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Kashipara Responsive Online Learing Platform 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /courses/course_detail_user_new.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the affected product appears to have a typo in it." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T00:15Z", + "lastModifiedDate" : "2025-05-27T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5213", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/xinpengccc/cve-/issues/1", + "name" : "https://github.com/xinpengccc/cve-/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310309", + "name" : "VDB-310309 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310309", + "name" : "VDB-310309 | projectworlds Responsive E-Learning System delete_file.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582909", + "name" : "Submit #582909 | Projectworlds Responsive E-Learning System v1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in projectworlds Responsive E-Learning System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/delete_file.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-27T00:15Z", + "lastModifiedDate" : "2025-05-27T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4783", + "ASSIGNER" : "cve-request@wordfence.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.7.9.1/assets/js/elements-js/countdown-timer.js", + "name" : "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.7.9.1/assets/js/elements-js/countdown-timer.js", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec41956f-eefc-4c8b-ade1-2a3a0f3d86df?source=cve", + "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec41956f-eefc-4c8b-ade1-2a3a0f3d86df?source=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML attributes of the Countdown Timer Widget in all versions up to, and including, 2.7.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.4, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 3.1, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-27T00:15Z", + "lastModifiedDate" : "2025-05-27T00:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5212", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ting-06a/myCVE/issues/3", + "name" : "https://github.com/ting-06a/myCVE/issues/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310308", + "name" : "VDB-310308 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310308", + "name" : "VDB-310308 | PHPGurukul Employee Record Management System editempexp.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582812", + "name" : "Submit #582812 | PHPGurukul Employee Record Management System V1.3 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul Employee Record Management System 1.3. It has been classified as critical. Affected is an unknown function of the file /admin/editempexp.php. The manipulation of the argument emp1name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T23:15Z", + "lastModifiedDate" : "2025-05-26T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5211", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ting-06a/myCVE/issues/2", + "name" : "https://github.com/ting-06a/myCVE/issues/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310307", + "name" : "VDB-310307 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310307", + "name" : "VDB-310307 | PHPGurukul Employee Record Management System myprofile.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582809", + "name" : "Submit #582809 | PHPGurukul Employee Record Management System V1.3 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in PHPGurukul Employee Record Management System 1.3 and classified as critical. This issue affects some unknown processing of the file /myprofile.php. The manipulation of the argument EmpCode leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T23:15Z", + "lastModifiedDate" : "2025-05-26T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5210", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/ting-06a/myCVE/issues/1", + "name" : "https://github.com/ting-06a/myCVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://phpgurukul.com/", + "name" : "https://phpgurukul.com/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310306", + "name" : "VDB-310306 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310306", + "name" : "VDB-310306 | PHPGurukul Employee Record Management System loginerms.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582802", + "name" : "Submit #582802 | PHPGurukul Employee Record Management System V1.3 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in PHPGurukul Employee Record Management System 1.3 and classified as critical. This vulnerability affects unknown code of the file /loginerms.php. The manipulation of the argument Email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T23:15Z", + "lastModifiedDate" : "2025-05-26T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5208", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/snkercyber/CVE/issues/4", + "name" : "https://github.com/snkercyber/CVE/issues/4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310305", + "name" : "VDB-310305 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310305", + "name" : "VDB-310305 | SourceCodester Online Hospital Management System check_availability.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582279", + "name" : "Submit #582279 | Campcodes Online Hospital Management System V1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sourcecodester.com/", + "name" : "https://www.sourcecodester.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in SourceCodester Online Hospital Management System 1.0. This affects an unknown part of the file /admin/check_availability.php. The manipulation of the argument emailid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T23:15Z", + "lastModifiedDate" : "2025-05-26T23:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5207", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/RS7325/cve/issues/1", + "name" : "https://github.com/RS7325/cve/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310304", + "name" : "VDB-310304 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310304", + "name" : "VDB-310304 | SourceCodester Client Database Management System superadmin_update_profile.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582253", + "name" : "Submit #582253 | SourceCodester Client Database Management System v1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.sourcecodester.com/", + "name" : "https://www.sourcecodester.com/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. Affected by this issue is some unknown functionality of the file /superadmin_update_profile.php. The manipulation of the argument nickname/email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 4.7, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.2, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T22:15Z", + "lastModifiedDate" : "2025-05-26T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5206", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/be2398/aaa/issues/4", + "name" : "https://github.com/be2398/aaa/issues/4", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310303", + "name" : "VDB-310303 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310303", + "name" : "VDB-310303 | Pixelimity Installation index.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582221", + "name" : "Submit #582221 | pixelimity <=1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in Pixelimity 1.0. Affected by this vulnerability is an unknown functionality of the file /install/index.php of the component Installation. The manipulation of the argument site_description leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 4.7, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.2, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T22:15Z", + "lastModifiedDate" : "2025-05-26T22:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5205", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://1000projects.org/", + "name" : "https://1000projects.org/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Jackie1732/CVE/issues/1", + "name" : "https://github.com/Jackie1732/CVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Jackie1732/CVE/issues/1", + "name" : "https://github.com/Jackie1732/CVE/issues/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310302", + "name" : "VDB-310302 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310302", + "name" : "VDB-310302 | 1000 Projects Daily College Class Work Report Book dcwr_entry.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.582110", + "name" : "Submit #582110 | 1000 Projects daily college class work report book php v1.0 SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in 1000 Projects Daily College Class Work Report Book 1.0. Affected is an unknown function of the file /dcwr_entry.php. The manipulation of the argument Date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T21:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5204", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6176", + "name" : "https://github.com/assimp/assimp/issues/6176", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6176", + "name" : "https://github.com/assimp/assimp/issues/6176", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20209911/ParseSkinLump-reproducer.zip", + "name" : "https://github.com/user-attachments/files/20209911/ParseSkinLump-reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310293", + "name" : "VDB-310293 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310293", + "name" : "VDB-310293 | Open Asset Import Library Assimp MDLMaterialLoader.cpp ParseSkinLump_3DGS_MDL7 out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578013", + "name" : "Submit #578013 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as problematic has been found in Open Asset Import Library Assimp 5.4.3. This affects the function MDLImporter::ParseSkinLump_3DGS_MDL7 of the file assimp/code/AssetLib/MDL/MDLMaterialLoader.cpp. The manipulation leads to out-of-bounds read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T21:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5203", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6175", + "name" : "https://github.com/assimp/assimp/issues/6175", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6175", + "name" : "https://github.com/assimp/assimp/issues/6175", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20209469/reproducer.zip", + "name" : "https://github.com/user-attachments/files/20209469/reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310292", + "name" : "VDB-310292 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310292", + "name" : "VDB-310292 | Open Asset Import Library Assimp ParsingUtils.h SkipSpaces out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578012", + "name" : "Submit #578012 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as problematic. Affected by this issue is the function SkipSpaces in the library assimp/include/assimp/ParsingUtils.h. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T20:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5202", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6174", + "name" : "https://github.com/assimp/assimp/issues/6174", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6174", + "name" : "https://github.com/assimp/assimp/issues/6174", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20209236/reproducer.zip", + "name" : "https://github.com/user-attachments/files/20209236/reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310291", + "name" : "VDB-310291 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310291", + "name" : "VDB-310291 | Open Asset Import Library Assimp HL1MDLLoader.cpp validate_header out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578007", + "name" : "Submit #578007 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as problematic. Affected by this vulnerability is the function HL1MDLLoader::validate_header of the file assimp/code/AssetLib/MDL/HalfLife/HL1MDLLoader.cpp. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T20:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5201", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6173", + "name" : "https://github.com/assimp/assimp/issues/6173", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6174", + "name" : "https://github.com/assimp/assimp/issues/6174", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20209125/line-832-reproducer.zip", + "name" : "https://github.com/user-attachments/files/20209125/line-832-reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310290", + "name" : "VDB-310290 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310290", + "name" : "VDB-310290 | Open Asset Import Library Assimp LWOLoader.cpp CountVertsAndFacesLWO2 out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578006", + "name" : "Submit #578006 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as problematic. Affected is the function LWOImporter::CountVertsAndFacesLWO2 of the file assimp/code/AssetLib/LWO/LWOLoader.cpp. The manipulation leads to out-of-bounds read. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T19:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5200", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6172", + "name" : "https://github.com/assimp/assimp/issues/6172", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6172", + "name" : "https://github.com/assimp/assimp/issues/6172", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20208985/line-452-reproducer.zip", + "name" : "https://github.com/user-attachments/files/20208985/line-452-reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310289", + "name" : "VDB-310289 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310289", + "name" : "VDB-310289 | Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_Quake1 out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578005", + "name" : "Submit #578005 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function MDLImporter::InternReadFile_Quake1 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation leads to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T19:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46802", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46802", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46802", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "For a short time they PTY is set to mode 666, allowing any user on the system to connect to the screen session." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T16:15Z", + "lastModifiedDate" : "2025-05-27T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-23395", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23395", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23395", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T16:15Z", + "lastModifiedDate" : "2025-05-27T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-23394", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23394", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23394", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A UNIX Symbolic Link (Symlink) Following vulnerability in openSUSE Tumbleweed cyrus-imapd allows escalation from cyrus to root.This issue affects openSUSE Tumbleweed cyrus-imapd before 3.8.4-2.1." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T16:15Z", + "lastModifiedDate" : "2025-05-27T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-23392", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-80" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23392", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23392", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in spacewalk-java allows execution of arbitrary Javascript code on target systems.This issue affects Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1: from ? before 5.0.24-150600.3.25.1; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3; SUSE Manager Server Module 4.3: from ? before 4.3.85-150400.3.105.3." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T16:15Z", + "lastModifiedDate" : "2025-05-26T16:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46803", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/13/6", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/13/6", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46803", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46803", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The default mode of pseudo terminals (PTYs) allocated by Screen was changed from 0620 to 0622, thereby allowing anyone to write to any Screen PTYs in the system." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T15:15Z", + "lastModifiedDate" : "2025-05-27T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-37992", + "ASSIGNER" : "cve@kernel.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://git.kernel.org/stable/c/2d3cbfd6d54a2c39ce3244f33f85c595844bd7b8", + "name" : "https://git.kernel.org/stable/c/2d3cbfd6d54a2c39ce3244f33f85c595844bd7b8", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/a7d6e0ac0a8861f6b1027488062251a8e28150fd", + "name" : "https://git.kernel.org/stable/c/a7d6e0ac0a8861f6b1027488062251a8e28150fd", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/d1365ca80b012d8a7863e45949e413fb61fa4861", + "name" : "https://git.kernel.org/stable/c/d1365ca80b012d8a7863e45949e413fb61fa4861", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/d3336f746f196c6a53e0480923ae93939f047b6c", + "name" : "https://git.kernel.org/stable/c/d3336f746f196c6a53e0480923ae93939f047b6c", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/d38939ebe0d992d581acb6885c1723fa83c1fb2c", + "name" : "https://git.kernel.org/stable/c/d38939ebe0d992d581acb6885c1723fa83c1fb2c", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://git.kernel.org/stable/c/fe88c7e4fc2c1cd75a278a15ffbf1689efad4e76", + "name" : "https://git.kernel.org/stable/c/fe88c7e4fc2c1cd75a278a15ffbf1689efad4e76", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: Flush gso_skb list too during ->change()\n\nPreviously, when reducing a qdisc's limit via the ->change() operation, only\nthe main skb queue was trimmed, potentially leaving packets in the gso_skb\nlist. This could result in NULL pointer dereference when we only check\nsch->limit against sch->q.qlen.\n\nThis patch introduces a new helper, qdisc_dequeue_internal(), which ensures\nboth the gso_skb list and the main queue are properly flushed when trimming\nexcess packets. All relevant qdiscs (codel, fq, fq_codel, fq_pie, hhf, pie)\nare updated to use this helper in their ->change() routines." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T15:15Z", + "lastModifiedDate" : "2025-05-26T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5196", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated/blob/main/poc.txt", + "name" : "https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated/blob/main/poc.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated/blob/main/poc.txt", + "name" : "https://github.com/Nouvexr/Wing-FTP-Server-7.4.4-RCE-Authenticated/blob/main/poc.txt", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310279", + "name" : "VDB-310279 | CTI Indicators (IOB, IOC, TTP)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310279", + "name" : "VDB-310279 | Wing FTP Server Lua Admin Console unnecessary privileges", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.584253", + "name" : "Submit #584253 | wftpserver Wing FTP Server 7.4.4 Remote Code Execution via Lua Admin Console", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.wftpserver.com/serverhistory.htm", + "name" : "https://www.wftpserver.com/serverhistory.htm", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in Wing FTP Server up to 7.4.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Lua Admin Console. The manipulation leads to execution with unnecessary privileges. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 7.4.4 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: \"[W]e do not consider it as a security vulnerability, because the system admin in WingFTP has full permissions [...], but you can suggest the user run WingFTP service as Normal User rather than SYSTEM/Root, it will be safer.\"" + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T14:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46805", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-367" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46805", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T14:15Z", + "lastModifiedDate" : "2025-05-26T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-46804", + "ASSIGNER" : "security@suse.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46804", + "name" : "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46804", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "name" : "https://www.openwall.com/lists/oss-security/2025/05/12/1", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A minor information leak when running Screen with setuid-root privileges allows unprivileged users to deduce information about a path that would otherwise not be available.\n\n\nAffected are older Screen versions, as well as version 5.0.0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T14:15Z", + "lastModifiedDate" : "2025-05-27T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-39498", + "ASSIGNER" : "audit@patchstack.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-201" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://patchstack.com/database/wordpress/plugin/spotlight-social-photo-feeds-premium/vulnerability/wordpress-spotlight-social-media-feeds-premium-plugin-1-7-1-sensitive-data-exposure-vulnerability?_s_id=cve", + "name" : "https://patchstack.com/database/wordpress/plugin/spotlight-social-photo-feeds-premium/vulnerability/wordpress-spotlight-social-media-feeds-premium-plugin-1-7-1-sensitive-data-exposure-vulnerability?_s_id=cve", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Spotlight Spotlight - Social Media Feeds (Premium) allows Retrieve Embedded Sensitive Data.This issue affects Spotlight - Social Media Feeds (Premium): from n/a through 1.7.1." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T14:15Z", + "lastModifiedDate" : "2025-05-26T14:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5186", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/xiaoyangsec/JeeSite_SSRF/blob/main/jeesite5-ssrf-file-read.md", + "name" : "https://github.com/xiaoyangsec/JeeSite_SSRF/blob/main/jeesite5-ssrf-file-read.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/xiaoyangsec/JeeSite_SSRF/blob/main/jeesite5-ssrf-file-read.md", + "name" : "https://github.com/xiaoyangsec/JeeSite_SSRF/blob/main/jeesite5-ssrf-file-read.md", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310274", + "name" : "VDB-310274 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310274", + "name" : "VDB-310274 | thinkgem JeeSite URI Scheme form ResourceLoader.getResource server-side request forgery", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.581704", + "name" : "Submit #581704 | JeeSite v5.11 Server-Side Request Forgery", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in thinkgem JeeSite up to 5.11.1. It has been rated as critical. Affected by this issue is the function ResourceLoader.getResource of the file /cms/fileTemplate/form of the component URI Scheme Handler. The manipulation of the argument Name leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5185", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-352" + }, { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://summerpearlgroup.gr/spgpm/releases", + "name" : "https://summerpearlgroup.gr/spgpm/releases", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310273", + "name" : "VDB-310273 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310273", + "name" : "VDB-310273 | Summer Pearl Group Vacation Rental Management Platform cross-site request forgery", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Summer Pearl Group Vacation Rental Management Platform up to 1.0.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40667", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-862" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-0", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-0", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Missing authorization vulnerability in TCMAN's GIM v11. This allows an authenticated attacker to access any functionality of the application even when they are not available through the user interface. To exploit the vulnerability the attacker must modify the HTTP code of the response from ‘302 Found’ to ‘200 OK’, as well as the hidden fields hdnReadOnly and hdnUserLogin." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40666", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-0", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-0", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Time-based blind SQL injection vulnerabilities in TCMAN's GIM v11. These allow an attacker to retrieve, create, update and delete databases through ArbolID parameter in/GIMWeb/PC/frmPreventivosList.aspx." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40665", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-0", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-0", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Time-based blind SQL injection vulnerabilities in TCMAN's GIM v11. These allow an attacker to retrieve, create, update and delete databases through ArbolID parameter in /GIMWeb/PC/frmCorrectivosList.aspx." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40664", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-306" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-0", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim-0", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Missing authentication vulnerability in TCMAN GIM v11. This allows an unauthenticated attacker to access the resources /frmGestionUser.aspx/GetData, /frmGestionUser.aspx/updateUser and /frmGestionUser.aspx/DeleteUser." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40663", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-xss-i2a-cronos-i2a", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-xss-i2a-cronos-i2a", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Stored Cross-Site Scripting (XSS) vulnerability in i2A-Cronos version 23.02.01.17, from i2A. It allows an authenticated attacker to upload a malicious SVG image into the user's personal space in /CronosWeb/Modules/Persons/PersonalDocuments/PersonalDocuments.\nThere is no reported fix at this time." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40653", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-209" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/user-enumeration-m3m-printer-server-web", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/user-enumeration-m3m-printer-server-web", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "User enumeration vulnerability in M3M Printer Server Web. This issue occurs during user authentication, where a difference in error messages could allow an attacker to determine whether a username is valid or not, allowing a brute force attack on valid usernames." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40652", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-covermanager", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-covermanager", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Stored Cross-Site Scripting (XSS) vulnerability in the CoverManager booking software. This allows an attacker to inject malicious scripts into the application, which are permanently stored on the server. The malicious scripts are executed in the browser of any user visiting the affected page without the user having to take any further action. This can allow the attacker to steal sensitive information, such as session cookies, login credentials, and perform actions on behalf of the affected user." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40650", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-639" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/insecure-direct-object-reference-idor-clickedu", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/insecure-direct-object-reference-idor-clickedu", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Insecure Direct Object Reference (IDOR) vulnerability in Clickedu. This vulnerability could allow an attacker to retrieve information about student report cards." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T13:15Z", + "lastModifiedDate" : "2025-05-26T13:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5184", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-200" + }, { + "lang" : "en", + "value" : "CWE-284" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://summerpearlgroup.gr/spgpm/releases", + "name" : "https://summerpearlgroup.gr/spgpm/releases", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310272", + "name" : "VDB-310272 | CTI Indicators (IOB, IOC, TTP)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310272", + "name" : "VDB-310272 | Summer Pearl Group Vacation Rental Management Platform HTTP Response Header information disclosure", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Summer Pearl Group Vacation Rental Management Platform up to 1.0.1. It has been classified as problematic. Affected is an unknown function of the component HTTP Response Header Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. Upgrading to version 1.0.2 is able to address this issue. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-26T12:15Z", + "lastModifiedDate" : "2025-05-26T12:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5183", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-601" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://summerpearlgroup.gr/spgpm/releases", + "name" : "https://summerpearlgroup.gr/spgpm/releases", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310271", + "name" : "VDB-310271 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310271", + "name" : "VDB-310271 | Summer Pearl Group Vacation Rental Management Platform Header redirect", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Summer Pearl Group Vacation Rental Management Platform up to 1.0.1 and classified as problematic. This issue affects some unknown processing of the component Header Handler. The manipulation of the argument Host leads to open redirect. The attack may be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 3.5, + "baseSeverity" : "LOW" + }, + "exploitabilityScore" : 2.1, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-26T12:15Z", + "lastModifiedDate" : "2025-05-26T12:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5182", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", + "name" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", + "name" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://summerpearlgroup.gr/spgpm/releases", + "name" : "https://summerpearlgroup.gr/spgpm/releases", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310270", + "name" : "VDB-310270 | CTI Indicators (IOB, IOC)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310270", + "name" : "VDB-310270 | Summer Pearl Group Vacation Rental Management Platform Listing authorization", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.youtube.com/watch?v=0wwuatTa6sU", + "name" : "https://www.youtube.com/watch?v=0wwuatTa6sU", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in Summer Pearl Group Vacation Rental Management Platform up to 1.0.1 and classified as critical. This vulnerability affects unknown code of the component Listing Handler. The manipulation leads to authorization bypass. The attack can be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T11:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5181", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", + "name" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS?tab=readme-ov-file#4%EF%B8%8F%E2%83%A3-inject-xss", + "name" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS?tab=readme-ov-file#4%EF%B8%8F%E2%83%A3-inject-xss", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS?tab=readme-ov-file#4%EF%B8%8F%E2%83%A3-inject-xss", + "name" : "https://github.com/Stolichnayer/Summer-Pearl-Group-IDOR-XSS?tab=readme-ov-file#4%EF%B8%8F%E2%83%A3-inject-xss", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://summerpearlgroup.gr/spgpm/releases", + "name" : "https://summerpearlgroup.gr/spgpm/releases", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310269", + "name" : "VDB-310269 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310269", + "name" : "VDB-310269 | Summer Pearl Group Vacation Rental Management Platform updateListing cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.581383", + "name" : "Submit #581383 | Summer Pearl Group Vacation Rental Management Platform 1.0.1 Authorization Bypass Through User-Controlled Key", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.youtube.com/watch?v=0wwuatTa6sU", + "name" : "https://www.youtube.com/watch?v=0wwuatTa6sU", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as problematic, was found in Summer Pearl Group Vacation Rental Management Platform up to 1.0.1. This affects an unknown part of the file /spgpm/updateListing. The manipulation of the argument spgLsTitle leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.2 is able to address this issue. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T11:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5180", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80", + "name" : "https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80", + "name" : "https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310268", + "name" : "VDB-310268 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310268", + "name" : "VDB-310268 | Wondershare Filmora Installer NFWCHK.exe uncontrolled search path", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.580226", + "name" : "Submit #580226 | Wondershare Filmora 14.5.16 Uncontrolled Search Path", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in Wondershare Filmora 14.5.16. Affected by this issue is some unknown functionality in the library CRYPTBASE.dll of the file NFWCHK.exe of the component Installer. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5179", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310267", + "name" : "VDB-310267 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310267", + "name" : "VDB-310267 | Realce Tecnologia Queue Ticket Kiosk Cadastro de Administrador Page index.php cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579852", + "name" : "Submit #579852 | Realce Tecnologia Queue ticket kiosk web application N/A Stored Cross Site Scripting", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as problematic was found in Realce Tecnologia Queue Ticket Kiosk up to 20250517. Affected by this vulnerability is an unknown functionality of the file /adm/index.php of the component Cadastro de Administrador Page. The manipulation of the argument Name/Usuário leads to cross site scripting. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "HIGH", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 2.4, + "baseSeverity" : "LOW" + }, + "exploitabilityScore" : 0.9, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-26T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5178", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-434" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310266", + "name" : "VDB-310266 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310266", + "name" : "VDB-310266 | Realce Tecnologia Queue Ticket Kiosk Image File ajax.php unrestricted upload", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579851", + "name" : "Submit #579851 | Realce Tecnologia Queue ticket kiosk web application N/A Improper File Upload Validation", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical has been found in Realce Tecnologia Queue Ticket Kiosk up to 20250517. Affected is an unknown function of the file /adm/ajax.php of the component Image File Handler. The manipulation of the argument files[] leads to unrestricted upload. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-26T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5177", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + }, { + "lang" : "en", + "value" : "CWE-94" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310265", + "name" : "VDB-310265 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310265", + "name" : "VDB-310265 | Realce Tecnologia Queue Ticket Kiosk Admin Login Page index.php cross site scripting", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579850", + "name" : "Submit #579850 | Realce Tecnologia Queue ticket kiosk web application N/A Cross Site Scripting", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Realce Tecnologia Queue Ticket Kiosk up to 20250517. It has been rated as problematic. This issue affects some unknown processing of the file /adm/index.php of the component Admin Login Page. The manipulation of the argument Usuário leads to cross site scripting. The attack may be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 4.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 1.4 + } + }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-26T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4057", + "ASSIGNER" : "secalert@redhat.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://access.redhat.com/errata/RHSA-2025:8147", + "name" : "RHSA-2025:8147", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://access.redhat.com/security/cve/CVE-2025-4057", + "name" : "https://access.redhat.com/security/cve/CVE-2025-4057", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2362827", + "name" : "RHBZ#2362827", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A flaw was found in ActiveMQ Artemis. The password generated by activemq-artemis-operator does not regenerate between separated CR dependencies." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-26T20:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-4053", + "ASSIGNER" : "cvd@cert.pl" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-312" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-4053/", + "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-4053/", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "The data stored in Be-Tech Mifare Classic card is stored in cleartext. An attacker having access to a Be-Tech hotel guest Mifare Classic card can create a master key card that unlocks all the locks in the building. \n\nThis issue affects all Be-Tech Mifare Classic card systems. To fix the vulnerability, it is necessary to replace the software, encoder, cards, and PCBs in the locks." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-26T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40672", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/privilege-escalation-proactivanet-espiral-ms-group", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/privilege-escalation-proactivanet-espiral-ms-group", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A Privilege Escalation vulnerability has been found in Panloader component v3.24.0.0 by Espiral MS Group. This vulnerability allows any user to override the file panLoad.exe that will be executed by SYSTEM user via a programmed task. This would allow an attacker to obtain administrator permissions to perform whatever activities he/she wants, shuch as accessing sensitive information, executing code remotely, and even causing a denial of service (DoS)." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-27T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-40671", + "ASSIGNER" : "cve-coordination@incibe.es" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-93" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-vulnerability-aes-multimedias-gestnet", + "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-vulnerability-aes-multimedias-gestnet", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "SQL injection vulnerability in AES Multimedia's Gestnet v1.07. This vulnerability allows an attacker to retrieve, create, update and delete databases via the ‘fk_remoto_central’ parameter on the ‘/webservices/articles.php’ endpoint." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-26T10:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-35003", + "ASSIGNER" : "security@apache.org" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "http://www.openwall.com/lists/oss-security/2025/05/26/1", + "name" : "http://www.openwall.com/lists/oss-security/2025/05/26/1", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/apache/nuttx/pull/16179", + "name" : "https://github.com/apache/nuttx/pull/16179", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://lists.apache.org/thread/k4xzz3jhkx48zxw9vwmqrmm4hmg78vsj", + "name" : "https://lists.apache.org/thread/k4xzz3jhkx48zxw9vwmqrmm4hmg78vsj", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Improper Restriction of Operations within the Bounds of a Memory Buffer and Stack-based Buffer Overflow vulnerabilities were discovered in Apache NuttX RTOS Bluetooth Stack (HCI and UART components) that may result in system crash, denial of service, or arbitrary code execution, after receiving maliciously crafted packets.\n\nNuttX's Bluetooth HCI/UART stack users are advised to upgrade to version 12.9.0, which fixes the identified implementation issues.\n\nThis issue affects Apache NuttX: from 7.25 before 12.9.0." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T10:15Z", + "lastModifiedDate" : "2025-05-27T15:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41655", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-306" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://certvde.com/en/advisories/VDE-2025-011", + "name" : "https://certvde.com/en/advisories/VDE-2025-011", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An unauthenticated remote attacker can access a URL which causes the device to reboot." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 7.5, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.6 + } + }, + "publishedDate" : "2025-05-26T09:15Z", + "lastModifiedDate" : "2025-05-26T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41654", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-200" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.vde.com/en/advisories/VDE-2025-011", + "name" : "https://cert.vde.com/en/advisories/VDE-2025-011", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "An unauthenticated remote attacker can access information about running processes via the SNMP protocol. The amount of returned data can trigger a reboot by the watchdog." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "NONE", + "availabilityImpact" : "HIGH", + "baseScore" : 8.2, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 4.2 + } + }, + "publishedDate" : "2025-05-26T09:15Z", + "lastModifiedDate" : "2025-05-26T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-1985", + "ASSIGNER" : "info@cert.vde.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-79" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://cert.vde.com/en/advisories/VDE-2025-011", + "name" : "https://cert.vde.com/en/advisories/VDE-2025-011", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Due to improper neutralization of input during web page generation (XSS) an unauthenticated remote attacker can inject HTML code into the Web-UI in the affected device." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "REQUIRED", + "scope" : "CHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "NONE", + "baseScore" : 6.1, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 2.7 + } + }, + "publishedDate" : "2025-05-26T09:15Z", + "lastModifiedDate" : "2025-05-26T09:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5176", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310264", + "name" : "VDB-310264 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310264", + "name" : "VDB-310264 | Realce Tecnologia Queue Ticket Kiosk Admin Login Page index.php sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579849", + "name" : "Submit #579849 | Realce Tecnologia Queue ticket kiosk web application N/A SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Realce Tecnologia Queue Ticket Kiosk up to 20250517. It has been declared as critical. This vulnerability affects unknown code of the file /adm/index.php of the component Admin Login Page. The manipulation of the argument Usuário leads to sql injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T08:15Z", + "lastModifiedDate" : "2025-05-26T08:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5175", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/erdogant/pypickle/commit/14b4cae704a0bb4eb6723e238f25382d847a1917", + "name" : "https://github.com/erdogant/pypickle/commit/14b4cae704a0bb4eb6723e238f25382d847a1917", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/issues/3", + "name" : "https://github.com/erdogant/pypickle/issues/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/issues/3", + "name" : "https://github.com/erdogant/pypickle/issues/3", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/issues/3#issue-3070689116", + "name" : "https://github.com/erdogant/pypickle/issues/3#issue-3070689116", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/issues/3#issuecomment-2888589652", + "name" : "https://github.com/erdogant/pypickle/issues/3#issuecomment-2888589652", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/releases/tag/2.0.0", + "name" : "https://github.com/erdogant/pypickle/releases/tag/2.0.0", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310263", + "name" : "VDB-310263 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310263", + "name" : "VDB-310263 | erdogant pypickle pypickle.py save improper authorization", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579824", + "name" : "Submit #579824 | erdogant pypickle 1.1.5 File Overwrite Vulnerability", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as critical. This affects the function Save of the file pypickle/pypickle.py. The manipulation leads to improper authorization. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The patch is named 14b4cae704a0bb4eb6723e238f25382d847a1917. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T08:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5174", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/erdogant/pypickle/commit/14b4cae704a0bb4eb6723e238f25382d847a1917", + "name" : "https://github.com/erdogant/pypickle/commit/14b4cae704a0bb4eb6723e238f25382d847a1917", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/issues/2", + "name" : "https://github.com/erdogant/pypickle/issues/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/issues/2", + "name" : "https://github.com/erdogant/pypickle/issues/2", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/issues/2#issuecomment-2889146579", + "name" : "https://github.com/erdogant/pypickle/issues/2#issuecomment-2889146579", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/erdogant/pypickle/releases/tag/2.0.0", + "name" : "https://github.com/erdogant/pypickle/releases/tag/2.0.0", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310262", + "name" : "VDB-310262 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310262", + "name" : "VDB-310262 | erdogant pypickle pypickle.py load deserialization", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579157", + "name" : "Submit #579157 | erdogant pypickle 1.1.5 Insecure Deserialization", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic. Affected by this issue is the function load of the file pypickle/pypickle.py. The manipulation leads to deserialization. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The patch is identified as 14b4cae704a0bb4eb6723e238f25382d847a1917. It is recommended to upgrade the affected component." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T07:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5173", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-20" + }, { + "lang" : "en", + "value" : "CWE-502" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/HumanSignal/label-studio-ml-backend/issues/765", + "name" : "https://github.com/HumanSignal/label-studio-ml-backend/issues/765", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310261", + "name" : "VDB-310261 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310261", + "name" : "VDB-310261 | HumanSignal label-studio-ml-backend PT File neural_nets.py load deserialization", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578126", + "name" : "Submit #578126 | HumanSignal label-studio-ml-backend 0.0 Deserialization", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability has been found in HumanSignal label-studio-ml-backend up to 9fb7f4aa186612806af2becfb621f6ed8d9fdbaf and classified as problematic. Affected by this vulnerability is the function load of the file label-studio-ml-backend/label_studio_ml/examples/yolo/utils/neural_nets.py of the component PT File Handler. The manipulation of the argument path leads to deserialization. An attack has to be approached locally. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "LOCAL", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 5.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 1.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T07:15Z", + "lastModifiedDate" : "2025-05-26T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-41441", + "ASSIGNER" : "vultures@jpcert.or.jp" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-209" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://jvn.jp/en/jp/JVN39546799/", + "name" : "https://jvn.jp/en/jp/JVN39546799/", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://www.synck.com/blogs/news/newsroom/detail_1745302910.html", + "name" : "https://www.synck.com/blogs/news/newsroom/detail_1745302910.html", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "Mailform Pro CGI prior to 4.3.4 generates error messages containing sensitive information, which may allow a remote unauthenticated attacker to obtain coupon codes. This vulnerability only affects products that use the coupon feature." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T07:15Z", + "lastModifiedDate" : "2025-05-26T07:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5172", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/yago3008/cves", + "name" : "https://github.com/yago3008/cves", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310260", + "name" : "VDB-310260 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310260", + "name" : "VDB-310260 | Econtrata valida sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579248", + "name" : "Submit #579248 | Econtrata NA SQL Injection", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, was found in Econtrata up to 20250516. Affected is an unknown function of the file /valida. The manipulation of the argument usuario leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "NONE", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 7.3, + "baseSeverity" : "HIGH" + }, + "exploitabilityScore" : 3.9, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T06:17Z", + "lastModifiedDate" : "2025-05-26T06:17Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5171", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-284" + }, { + "lang" : "en", + "value" : "CWE-434" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310259", + "name" : "VDB-310259 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310259", + "name" : "VDB-310259 | llisoft MTA Maita Training System OpenController.java this.fileService.download unrestricted upload", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579088", + "name" : "Submit #579088 | MTA Maita Training System v4.5 Arbitrary File Upload Vulnerability", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wx.mail.qq.com/s?k=o3X5wV0ZZH0nuusQdO", + "name" : "https://wx.mail.qq.com/s?k=o3X5wV0ZZH0nuusQdO", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability, which was classified as critical, has been found in llisoft MTA Maita Training System 4.5. This issue affects the function this.fileService.download of the file com\\llisoft\\controller\\OpenController.java. The manipulation of the argument url leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T06:17Z", + "lastModifiedDate" : "2025-05-26T06:17Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5170", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ { + "lang" : "en", + "value" : "CWE-89" + }, { + "lang" : "en", + "value" : "CWE-74" + } ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://vuldb.com/?ctiid.310258", + "name" : "VDB-310258 | CTI Indicators (IOB, IOC, TTP, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310258", + "name" : "VDB-310258 | llisoft MTA Maita Training System AdminShitiController.java AdminShitiListRequestVo sql injection", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.579069", + "name" : "Submit #579069 | MTA Maita Training System v4.5 SQL Injection Vulnerability", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://wx.mail.qq.com/s?k=oVXdxVkeZQAlUQwVe2", + "name" : "https://wx.mail.qq.com/s?k=oVXdxVkeZQAlUQwVe2", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as critical was found in llisoft MTA Maita Training System 4.5. This vulnerability affects the function AdminShitiListRequestVo of the file com\\llisoft\\controller\\admin\\shiti\\AdminShitiController.java. The manipulation of the argument stTypeIds leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { + "baseMetricV3" : { + "cvssV3" : { + "version" : "3.1", + "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector" : "NETWORK", + "attackComplexity" : "LOW", + "privilegesRequired" : "LOW", + "userInteraction" : "NONE", + "scope" : "UNCHANGED", + "confidentialityImpact" : "LOW", + "integrityImpact" : "LOW", + "availabilityImpact" : "LOW", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM" + }, + "exploitabilityScore" : 2.8, + "impactScore" : 3.4 + } + }, + "publishedDate" : "2025-05-26T05:15Z", + "lastModifiedDate" : "2025-05-26T05:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5169", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6171", + "name" : "https://github.com/assimp/assimp/issues/6171", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6171", + "name" : "https://github.com/assimp/assimp/issues/6171", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20208891/reproducer.zip", + "name" : "https://github.com/user-attachments/files/20208891/reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310257", + "name" : "VDB-310257 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310257", + "name" : "VDB-310257 | Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_3DGS_MDL345 out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578004", + "name" : "Submit #578004 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability classified as problematic has been found in Open Asset Import Library Assimp 5.4.3. This affects the function MDLImporter::InternReadFile_3DGS_MDL345 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T05:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5168", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6170", + "name" : "https://github.com/assimp/assimp/issues/6170", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6170", + "name" : "https://github.com/assimp/assimp/issues/6170", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20208878/reproducer.zip", + "name" : "https://github.com/user-attachments/files/20208878/reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310256", + "name" : "VDB-310256 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310256", + "name" : "VDB-310256 | Open Asset Import Library Assimp MDLLoader.cpp ImportUVCoordinate_3DGS_MDL345 out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578003", + "name" : "Submit #578003 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as problematic. Affected by this issue is the function MDLImporter::ImportUVCoordinate_3DGS_MDL345 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation of the argument iIndex leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T04:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5167", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6169", + "name" : "https://github.com/assimp/assimp/issues/6169", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6169", + "name" : "https://github.com/assimp/assimp/issues/6169", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20208666/reproducer.zip", + "name" : "https://github.com/user-attachments/files/20208666/reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310255", + "name" : "VDB-310255 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310255", + "name" : "VDB-310255 | Open Asset Import Library Assimp LWOLoader.h GetS0 out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578002", + "name" : "Submit #578002 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as problematic. Affected by this vulnerability is the function LWOImporter::GetS0 in the library assimp/code/AssetLib/LWO/LWOLoader.h. The manipulation of the argument out leads to out-of-bounds read. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T04:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + }, { + "cve" : { + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2025-5166", + "ASSIGNER" : "cna@vuldb.com" + }, + "problemtype" : { + "problemtype_data" : [ { + "description" : [ ] + } ] + }, + "references" : { + "reference_data" : [ { + "url" : "https://github.com/assimp/assimp/issues/6128", + "name" : "https://github.com/assimp/assimp/issues/6128", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6168", + "name" : "https://github.com/assimp/assimp/issues/6168", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/assimp/assimp/issues/6168", + "name" : "https://github.com/assimp/assimp/issues/6168", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://github.com/user-attachments/files/20208318/reproducer.zip", + "name" : "https://github.com/user-attachments/files/20208318/reproducer.zip", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?ctiid.310254", + "name" : "VDB-310254 | CTI Indicators (IOB, IOC, IOA)", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?id.310254", + "name" : "VDB-310254 | Open Asset Import Library Assimp MDC File Parser MDCLoader.cpp InternReadFile out-of-bounds", + "refsource" : "", + "tags" : [ ] + }, { + "url" : "https://vuldb.com/?submit.578001", + "name" : "Submit #578001 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", + "refsource" : "", + "tags" : [ ] + } ] + }, + "description" : { + "description_data" : [ { + "lang" : "en", + "value" : "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as problematic. Affected is the function MDCImporter::InternReadFile of the file assimp/code/AssetLib/MDC/MDCLoader.cpp of the component MDC File Parser. The manipulation of the argument pcVerts leads to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." + } ] + } + }, + "configurations" : { + "CVE_data_version" : "4.0", + "nodes" : [ ] + }, + "impact" : { }, + "publishedDate" : "2025-05-26T04:15Z", + "lastModifiedDate" : "2025-05-28T18:15Z" + } ] +} \ No newline at end of file